Key Policy Attribute Based Encryption in Cloud Storage

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5

Abstract

Abstract: Cloud Computing is the rapid growing technology and enables highly scalable services to be easily consumed over the Internet on an as-needed basis. It is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices. Cloud computing has become a highlydemanded service or utility due to the advantages of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Some cloud vendors are experiencing growth rates of 50% per year but being still in a stage of infancy, it has pitfalls that need to be addressed to make cloudcomputing services more reliable and user friendly. Data sharing is an important functionality in cloud storage. The proposed system provides how to maintain integrity, confidentiality and availability to share data with others. Here described new Attribute Based Encryption cryptosystems which generates encryption, decryptiontime along with file size. Proposed work explains encryption with Attribute Based encryption then file is spitted into chunks. Hash key is generated for every data chunk which is unique. Secure hash algorithm is used for generation of hash key. For decryption file is searched on cloud, with private key then it is decrypted. Attribute Based encryption along with secure hash algorithm is applied. This proposed work describes analysis of encryption, decryption time calculated with Identity Based encryption and Attribute Based encryption according to file size. It creates hash key for every chunk which is unique. Proposed algorithm gives confidentiality towork as it is a public key encryption algorithm of cryptography. It is also asymmetric i.e. key set is used for data encryption and decryption. Data is stored on cloud means it is available to everyone through Cloud space. Key generated for encryption and decryption is runtime. In this work analysis is there. Encryption and decryptiontime required by Identity Based Encryption and Attribute Based Encryption is calculated for comparison purpose. Both algorithms user can apply on different file type such as pdf, ppt, doc, mp3, jpg and file size.

Authors and Affiliations

Prof. Dipa Dharmadhikari , Sonali Deshpande

Keywords

Related Articles

 Face Recognition using Feed Forward Neural Network

Abstract: In this paper, we propose four techniques for extraction of facial features namely 2DPCA, LDA, KPCA and KFA. The purpose of face feature extraction is to capture certain discriminative features that are unique...

 Detection of Replica Nodes in Wireless Sensor Network: A Survey

 Abstract: Network security has become a challenging area, historically only tackled by well qualified andfamiliar experts. Although more pupils are becoming wired, an increasing number of pupils need to understandb...

Using Data-Mining Technique for Census Analysis to Give GeoSpatial Distribution of Nigeria.

 There are patterns buried within the mass of data in the various editions of population census figures in this country. These are patterns that will be impossible for humans working with bare eyes and hands, to u...

 Bandwidth Management on Cloud Computing Network

 Abstract: To be able to manage the available bandwidth and distribute it among the Cloud Applications userseffectively is a very critical issue to avoid network congestion and network resources abuse. In this paper...

 Implementation of Novel Algorithm (SPruning Algorithm)

 Abstract: Decision trees are very significant for taking any type of verdict related to any field. Today there is ample amount of data but that data is uncooked data therefore to make it cooked data, data mining is...

Download PDF file
  • EP ID EP96326
  • DOI -
  • Views 92
  • Downloads 0

How To Cite

Prof. Dipa Dharmadhikari, Sonali Deshpande (2016). Key Policy Attribute Based Encryption in Cloud Storage. IOSR Journals (IOSR Journal of Computer Engineering), 18(5), 64-71. https://europub.co.uk/articles/-A-96326