Key Policy Attribute Based Encryption in Cloud Storage

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5

Abstract

Abstract: Cloud Computing is the rapid growing technology and enables highly scalable services to be easily consumed over the Internet on an as-needed basis. It is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices. Cloud computing has become a highlydemanded service or utility due to the advantages of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Some cloud vendors are experiencing growth rates of 50% per year but being still in a stage of infancy, it has pitfalls that need to be addressed to make cloudcomputing services more reliable and user friendly. Data sharing is an important functionality in cloud storage. The proposed system provides how to maintain integrity, confidentiality and availability to share data with others. Here described new Attribute Based Encryption cryptosystems which generates encryption, decryptiontime along with file size. Proposed work explains encryption with Attribute Based encryption then file is spitted into chunks. Hash key is generated for every data chunk which is unique. Secure hash algorithm is used for generation of hash key. For decryption file is searched on cloud, with private key then it is decrypted. Attribute Based encryption along with secure hash algorithm is applied. This proposed work describes analysis of encryption, decryption time calculated with Identity Based encryption and Attribute Based encryption according to file size. It creates hash key for every chunk which is unique. Proposed algorithm gives confidentiality towork as it is a public key encryption algorithm of cryptography. It is also asymmetric i.e. key set is used for data encryption and decryption. Data is stored on cloud means it is available to everyone through Cloud space. Key generated for encryption and decryption is runtime. In this work analysis is there. Encryption and decryptiontime required by Identity Based Encryption and Attribute Based Encryption is calculated for comparison purpose. Both algorithms user can apply on different file type such as pdf, ppt, doc, mp3, jpg and file size.

Authors and Affiliations

Prof. Dipa Dharmadhikari , Sonali Deshpande

Keywords

Related Articles

 A Novel Method of Generating (Stream Cipher) Keys forSecure Communication

 Abstract: Security is an important part of computer science that deals with the protection of importantinformation from access, change or modified, and delete, so there are many ways to improve the security ofinfor...

 Lightning Strike and Thunder and its Effect on Television Signal Transmission

Abstract: The lightning strike and thunder and its effect on television signal transmission in Nigerian Television, NTA Abakaliki Nigeria was analyzed. From the analyses, it was observed that lightning and thunder strike...

An Accident Prevention Technique For Speed Bumper Detection Through IR Sensor And Motor Speed Control Using Timer

Abstract : A method of preventing an accident using a technology is called ultrasonic. This project is about making cars more intelligent and interactive which may notify or resist user under unacceptable conditions. Thi...

 A Multi-Purpose Voice Controlled System on Android Platform

 Abstract: This paper describes a method which helps in making Android operating system based mobile phonedetect a voice command and perform the operation accordingly. We also introduce a new secured backup and rest...

Ict As A Change Agent For Socialization And Social Engineering

Abstract: The future communication has been predicted to depend to a great degree on electronic modes; academics businessmen and professionals in various fields, purpose, various uses of ICT facilities and new media gene...

Download PDF file
  • EP ID EP96326
  • DOI -
  • Views 125
  • Downloads 0

How To Cite

Prof. Dipa Dharmadhikari, Sonali Deshpande (2016). Key Policy Attribute Based Encryption in Cloud Storage. IOSR Journals (IOSR Journal of Computer Engineering), 18(5), 64-71. https://europub.co.uk/articles/-A-96326