Literature Survey on Attribute Based Encryption (ABE)
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2016, Vol 3, Issue 8
Abstract
During this Paper, we tend to show however Anony Control-F extends the User Revocation rule with a data structure to enhance quantify ability and adaptability whereas at a similar time inherits the feature of fine-grained access management. Second, we tend to demonstrate the way to implement a full-fledged access management theme for cloud computing. The theme provides full support for stratified user grant, file creation, file deletion, and user revocation in cloud computing. Third, we tend to formally prove the protection of the projected theme supported the protection Cloud computing is associate rising computing paradigm during which resources of the computing infrastructure ar provided as services over the net. As promising as a result of it's, this paradigm together brings forth many new challenges for info security and access management once users source sensitive information for sharing on cloud servers, that aren't among a similar trustworthy domain as information homeowners. to stay sensitive user information confidential against un-trusted servers, existing solutions generally apply field of study methods by revealing info secret writing keys entirely to approved users. However, in doing therefore, these solutions inevitably introduce a major computation overhead on the info owner for key distribution and knowledge} management once fine grained data access management is desired, and so do not scale well. the matter of at constant time achieving fine-grainedness, measurability, and data confidentiality of access management very still remains unresolved. In This paper addresses this rewarding open issue by, on one hand, shaping and implementing access policies supported knowledge attributes, and, on the opposite hand, permitting the knowledge|the info|the information owner to represent most of the computation tasks concerned in fine grained knowledge access management to un-trusted cloud servers while not revealing the underlying data contents.
Authors and Affiliations
S. Ilakiya
Agronomic Characters on Three Varieties of Sorgum with Differences of NPK Fertilizer Source and Harvest Time
The research took place in the rainy season 2014-2015 which was held in Gowa regency of South Sulawesi. The objective of the study was to evaluate the agronomic character of three varieties of sorghum treated with differ...
Impact of Electronic Gadgets
The electronic gadgets are very popular among the people and the people are very interested used of the electronic gadgets. So, here based on the craze among the people the survey based study is performed and collected d...
A Computational Technique for Efficient and Accurate Stress Prediction in a Complex Wind Turbine Model
Stress concentrations are a concern in engineering because of their implications regarding structural integrity. Efficiently and accurately computing the associated stresses is therefore important. Unfortunately it is no...
A Review on Pattern Recognition Using Genetic Algorithms
Pattern recognition is a process to classify types of objects appearing in the input pattern. In computer science pattern recognition is the imposition of identity on input data, such as speech, images, or a stream of te...
Cytotoxic Effects of Raphanus Sativus Root Extract on Root Meristem of Allium Cepa
The cytotoxic effects of radish root were investigated on meristematic cells of A. cepa roots. Actively growing root tips of A. cepa were treated with five concentrations (100%, 75%, 50%, 25% and 10%) of the root extract...