ENHANCING PRIVACY USING COLLABORATIVE ATTRIBUTE ENCRYPTION TECHNIQUES
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 11
Abstract
In the era where computers dominate the other facilities, it becomes even more productive once connected to the world with the help of internet. Although it possesses certain challenges to connect oneself to the world. The challenges of Authenticity, confidentiality, and anonymity and all of the notions of security with the concern aspects. Depending on the application the encryption techniques differs the most recent assortment that is the attribute based encryption, unlike traditional encryption technique this technique doesn’t reveals its identity Security tends to be the most important aspect when it comes to enter in the visual world thus the cryptographic technique is very much essential to be optimally developed so the transactions made cannot be read or changed in the network that is the data have to be securely traverse via internet, Attribute based cryptography techniques are dominating the aspects of security. The innovative use of attributes can improve the traditional techniques of data sharing which was by using trusted mediated servers. These attributes have been exploited to generate the public key and have been used as user’s access policy to restrict the user’s access. It is attribute-based, as it allows encrypting under logical combinations of attributes, that is, properties that users satisfy. It is hybrid, as it combines ciphertext policy attribute-based encryption (CP-ABE) with location-based encryption (LBE) on the level of symmetric keys. It supports encryption under expressive policies, since it can efficiently handle dynamic attributes with continuous values, such as location. Public key encryption techniques provide authenticity through digital signature and confidentiality with the help of public key encryption technique. Security also overcomes the bottleneck of centralization since there is no central authority, it works as distributed attribute based encryption where the load is well distributed among every participating node
Authors and Affiliations
Ansari Tasin Habib Ahmad
NOVEL REVIEW OF MANET ROUTING PROTOCOLS
In recent years mobile ad hoc networks (MANET) become very popular and useful for communication. Mobile ad hoc network is a collection of mobile nodes which communicate to each other without any infrastructure and...
VIRTUAL MACHINE PLACEMENT AND LOAD REBALANCING ALGORITHMS IN CLOUD COMPUTING SYSTEMS
The goal of virtual machine placement in cloud environment is to provide better service to the cloud users, and also the effective use of available resources. In this paper a review of various algorithms has b...
QUALITY OF SERVICE AND TRAFFIC ENGINEERING IN MPLS NETWORK BY FUZZY LOGIC COMPUTING : A BRIEF STUDY
This research paper suggests a load balancing algorithm using fuzzy logic methodology so that maximum Quality of Service can be attained. Avoidance of jamming of packets is one of the key performance objectives of...
DETERMINING SOUND ABSORBTION COEFFICIENT OF NATURAL FIBER REINFORCED POLYPROPYLENE COMPOSITES
Natural fibers are those include those produced by plants, animals and geological process around the surroundings of living organisms. They are mainly degradable throughout their life cycle. The former are mainly...
IMPROVING THE PERFORMANCE OF SOLAR CELLS BASED ON THIN FILM ELECTROGENERATED OF CuInSe2
This study shows that thin films of CuInSe2 and CuIn(Se,S)2 may be developed by the electrochemical method of deposition using an electrolyte solution containing sulphate. The films obtained are almost amorphous a...