Literature Survey on Attribute Based Encryption (ABE)

Abstract

During this Paper, we tend to show however Anony Control-F extends the User Revocation rule with a data structure to enhance quantify ability and adaptability whereas at a similar time inherits the feature of fine-grained access management. Second, we tend to demonstrate the way to implement a full-fledged access management theme for cloud computing. The theme provides full support for stratified user grant, file creation, file deletion, and user revocation in cloud computing. Third, we tend to formally prove the protection of the projected theme supported the protection Cloud computing is associate rising computing paradigm during which resources of the computing infrastructure ar provided as services over the net. As promising as a result of it's, this paradigm together brings forth many new challenges for info security and access management once users source sensitive information for sharing on cloud servers, that aren't among a similar trustworthy domain as information homeowners. to stay sensitive user information confidential against un-trusted servers, existing solutions generally apply field of study methods by revealing info secret writing keys entirely to approved users. However, in doing therefore, these solutions inevitably introduce a major computation overhead on the info owner for key distribution and knowledge} management once fine grained data access management is desired, and so do not scale well. the matter of at constant time achieving fine-grainedness, measurability, and data confidentiality of access management very still remains unresolved. In This paper addresses this rewarding open issue by, on one hand, shaping and implementing access policies supported knowledge attributes, and, on the opposite hand, permitting the knowledge|the info|the information owner to represent most of the computation tasks concerned in fine grained knowledge access management to un-trusted cloud servers while not revealing the underlying data contents.

Authors and Affiliations

S. Ilakiya

Keywords

Related Articles

Relevant Feature Selection from High-Dimensional Data Using MST Based Clustering

Feature selection is the process of identifying a subset of the most useful features that produces compatible results as the original entire set of features. Features provide the information about the data set. In Highdi...

Reliability Assassment of Selected Fossil Fuel Operated Power Stations in Nigeria

As the gap between supply and demand on electric energy widens in Nigeria, it becomes necessary to assess the performance of fossil fueled generator turbine that dominates the electric power industry. Consequently, this...

Mitigation of Voltage Complication by A Novel Control Algorithm Based Dynamic Voltage Restorer

This project gives the systematic procedure of the modeling and simulation of a Dynamic Voltage Restorer (DVR) for power quality problem, voltage sag based on Pulse Width Modulation (PWM) technique. This problem is reduc...

Energy-Aware Service and Route Discovery Scheme for AODV using Piggybacking in MANETs (AODV-EASARD)

Mobile ad-hoc network (MANET) is an infrastructure-less multihop network where each node communicates with other nodes directly or indirectly through intermediate nodes. Thus, all nodes in a MANET basically function as h...

Development of Modern Settlement Kekalik Jaya Mataram City

The number of residents of Kekalik Jaya urban village is 1.16% per year, so housing demand is increasing as well as basic service needs. This research is about how the existing condition of settlement development and how...

Download PDF file
  • EP ID EP244905
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

S. Ilakiya (2016). Literature Survey on Attribute Based Encryption (ABE). International journal of Emerging Trends in Science and Technology, 3(8), 4447-4449. https://europub.co.uk/articles/-A-244905