A Deniable Cp-Abe Scheme For An Audit-Free Cloud Storage Service

Abstract

To brawl against outside coercion, we meant to build an encryption scheme that could help cloud storage providers keep away from this quandary. In our move toward, we present cloud storage providers means to create fake user secrets. Given such fake user secrets, outside coercers can only get hold of phony data from a user’s stored cipher text. Once coercers imagine the received secrets are genuine, they will be content and more prominently cloud storage providers will not have exposed any real secrets. Consequently, user isolation is still protected. This concept comes from a special kind of encryption scheme called deniable encryption. Deniable encryption absorb senders and receivers form convincing fake evidence of forged data in cipher texts such that outside coercers are contented.

Authors and Affiliations

P. Aparna| Dept. of CSE, Baba Institute Of Technology & Sciences, Bakkannapalem, Madhurawada, Visakhapatnam ,AP, India, K. Satya Narayana Murthy| Dept. of CSE, Baba Institute Of Technology & Sciences, Bakkannapalem, Madhurawada, Visakhapatnam ,AP, India

Keywords

Related Articles

Monitoring and minimizing the Total Energy consumption in Mobile Nodes at the end-to-end Quality of Service

In general mobile networks are highly unpredictable at the end-to-end quality-ofservice (QoS) and the scale of the individual node. Due to its high requirement and complicated security issues researchers concentrated...

A New Multilevel Inverter Topology of D-STATCOM to Compensate Reactive and Nonlinear Loads

This work proposes an enhanced hybrid distribution static compensator (D-STATCOM) topology to address some practical issues like power loss, filter size, performance etc. A LCL filter has been utilized at the front e...

Token Based Fair Queuing Algorithms for Wireless Networks

Token Based Fair Queuing (TBFQ) algorithm has been proposed for single carrier Time Division Multiple Access (TDMA) systems, to suit WINNER Orthogonal Frequency Division Multiple Access (OFDMA) air-interface. This al...

Optimal Clustering Approach Used For Concurrent Probabilistic Graphs

To tackle the testing issue two calculations, in particular the PEEDR and the CPGS bunching calculation are characterized for each of the proposed calculations, and after that likewise characterize in the ballpark of...

Design and Implementation of home security system with feedback and control of electric gadgetry

An embedded system is designed for providing security to home, as the home security is the more prior among all other aspects which are among to home. The system has two sections, one is main station and other is fee...

Download PDF file
  • EP ID EP16819
  • DOI -
  • Views 298
  • Downloads 6

How To Cite

P. Aparna, K. Satya Narayana Murthy (2016). A Deniable Cp-Abe Scheme For An Audit-Free Cloud Storage Service. International Journal of Science Engineering and Advance Technology, 4(10), 602-604. https://europub.co.uk/articles/-A-16819