A Survey on Secure Key Policy Attribute-Based Encryption Policy for Data Sharing Among Dynamic Groups in the Cloud
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 6
Abstract
Profited from distributed computing, clients can accomplish a powerful and sparing methodology for information sharing among gathering individuals in the cloud with the characters of low support and little administration cost. Then, we should give security insurances to the sharing information records since they are outsourced. Lamentably, in view of the continuous change of the participation, sharing information while giving security saving is still a testing issue, particularly for an untrusted cloud because of the intrigue assault. Besides, to exist conspires, the security of key appropriation depends on the protected correspondence channel, be that as it may, to have such channel is a solid supposition and is troublesome for practice. In this paper, we propose a secure information sharing plan for element individuals. Firstly, we propose a safe way for key conveyance with no protected correspondence channels, and the clients can safely acquire their private keys from gathering chief. Furthermore, our plan can accomplish fine-grained access control, any client in the gathering can utilize the source in the cloud and disavowed clients can't get to the cloud again after they are denied. Thirdly, we can shield the plan from agreement assault, which implies that disavowed clients can't get the first information document regardless of the possibility that they plan with the untrusted cloud. Major problem in public clouds is how to share documents based on fine-grained attribute based access control policies, sharing data in a dynamic groups while preserving data and identity privacy from an un trusted cloud is still a challenging issue, due to the frequent change of the membership., encrypting documents with different keys using a public key cryptosystem such as attribute based encryption (ABE), and/or proxy re-encryption (PRE) approach has some weaknesses: it cannot efficiently handle adding/revoking users or identity attributes, and policy changes; it requires to keep multiple encrypted copies of the same documents; it incurs high computational costs. In this paper, I propose a secure multi-owner attribute authorities based data sharing scheme for dynamic groups in the cloud. Tha aim of my paper is secure data sharing in a dynamic group where the there is no fixed Attribute authorities where as multi – owner attribute authorities scheme is possible. key policy key policy attribute-based encryption (KP-ABE) method is used to select dynamic AA(Attribute authorities). By leveraging group signature, signed receipts and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. As the result the computation cost is reduced and storage overhead and encryption computation cost of our scheme are independent with the number of revoked users so the encryption cost is also reduced.
Authors and Affiliations
Soniya Thomas, Mr. J. Santhosh
Optimal Seeding And Self-Reproduction From A Mathematical Point of View.
Abstract: P. Kabamba developed generation theory as a tool for studying self-reproducing systems. We provide an alternative definition of a generation system and give a complete solution to the problem of finding op...
Gain Comparison between NIFTY and Selected Stocks identified by SOM using Technical Indicators
The main aim of every investor is to identify a stock that has potential to go up so that the investor can maximize possible returns on investment. After identification of stock the second important point of deci...
Performance Measurement of WLAN Based On Medium Access Control for Wirelessly Connected Stations
Abstract: This paper is mainly focuses on the Medium Access Control (MAC) sublayer of the IEEE 802.11 standard for Wireless Local Area Network (WLAN) and delay measurement among the network and also compare of the traffi...
Photo Catalytic Degradation of Effluent of Iron and Power Plant Industries in Aqueous Solution by CDS Nano Catalyst Using UVIrradiation
Abstract: The iron and power plant industries consume significant amount of water during the power generation and finishing operations. In this operation a used water having high chemical oxygen demand contents and the w...
Sliced Ridgelet Transform for Image Denoising
Image denoising based on ridgelet transforms gives better result in image denoising than standard wavelet transforms. In this research work, the researcher introduces a new approach for image denoising that is ba...