Abstract

We return to attribute based information sharing plan keeping in mind the end goal to fathom the key escrow issue additionally enhance the expressiveness of characteristic, so that the subsequent plan is all the more well-disposed to distributed computing applications. We propose an enhanced two-party key issuing protocol that can ensure that neither key expert nor cloud specialist co-op can trade off the entire mystery key of a client separately. In addition, we present the idea of quality with weight, being given to upgrade the outflow of characteristic, which cannot just extend the expression from paired to discretionary state, additionally help the many-sided quality of get to approach. Along these lines, both capacity cost and encryption many-sided quality for a cipher text are assuaged.

Authors and Affiliations

Kokiripati Sai lakshmi| Dept. of CSE,ELURU College of Engineering and Technology, Duggirala(V), Pedavegi(M), ELURU, Andhra Pradesh, Kasani Vaddikasulu| Dept. of CSE,ELURU College of Engineering and Technology, Duggirala(V), Pedavegi(M), ELURU, Andhra Pradesh

Keywords

Related Articles

Character segmentation from multi-oriented video words using Discrete Wavelet Transform and K-Means Clustering

The paper presents a two stage methods for the image segmentation from multi-oriented video words by using of DWT process k-means clustering. As the commercial usage of digital contents are on rise, the requirement o...

The adaptive Privacy Policy Prediction for User Uploaded Images on Social Networks

In These days Social media's ended up being an awesome degree predominant. It permits us to talk with numerous people. Clients of casual correspondence long range informal communication, for instance, LinkedIn, and F...

Novel Techniques In Detecting Reputation based Attacks And Effectively Identify Trustworthy Cloud Services

The very dynamic, distributed, and non-transparent nature of cloud administrations make the trust administration in cloud situations a noteworthy test. Customers' criticism is a decent source to evaluate the general...

Improve the Security and Usability of User Session using Continuous Authentication Protocol

Session organization of distributed web applications is usually depends on textual passwords and biometric verification at the starting of session, but here single authentication is happening. In this the problem is c...

Modeling and Thermal Conduction and Static Analysis of an IC Engine Piston using CATIA V5 Tool and ANSYS

In now a days technology, diesel engine plays an important role in the transportation sector, agriculture pumping sets etc, where large amount of diesel consumed. But according to the ministry of petroleum, the petro...

Download PDF file
  • EP ID EP16986
  • DOI -
  • Views 250
  • Downloads 3

How To Cite

Kokiripati Sai lakshmi, Kasani Vaddikasulu (2017). . International Journal of Science Engineering and Advance Technology, 5(7), 771-774. https://europub.co.uk/articles/-A-16986