ENHANCING PRIVACY USING COLLABORATIVE ATTRIBUTE ENCRYPTION TECHNIQUES
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 11
Abstract
In the era where computers dominate the other facilities, it becomes even more productive once connected to the world with the help of internet. Although it possesses certain challenges to connect oneself to the world. The challenges of Authenticity, confidentiality, and anonymity and all of the notions of security with the concern aspects. Depending on the application the encryption techniques differs the most recent assortment that is the attribute based encryption, unlike traditional encryption technique this technique doesn’t reveals its identity Security tends to be the most important aspect when it comes to enter in the visual world thus the cryptographic technique is very much essential to be optimally developed so the transactions made cannot be read or changed in the network that is the data have to be securely traverse via internet, Attribute based cryptography techniques are dominating the aspects of security. The innovative use of attributes can improve the traditional techniques of data sharing which was by using trusted mediated servers. These attributes have been exploited to generate the public key and have been used as user’s access policy to restrict the user’s access. It is attribute-based, as it allows encrypting under logical combinations of attributes, that is, properties that users satisfy. It is hybrid, as it combines ciphertext policy attribute-based encryption (CP-ABE) with location-based encryption (LBE) on the level of symmetric keys. It supports encryption under expressive policies, since it can efficiently handle dynamic attributes with continuous values, such as location. Public key encryption techniques provide authenticity through digital signature and confidentiality with the help of public key encryption technique. Security also overcomes the bottleneck of centralization since there is no central authority, it works as distributed attribute based encryption where the load is well distributed among every participating node
Authors and Affiliations
Ansari Tasin Habib Ahmad
DESIGN AND DEVELOPMENT OF CAR PARKING AND AUTOMATION BILLING SYSTEM
The client uses MS Excel, and also maintains their records, however it is difficult to share the data to number of system in multi user environment, there is lot of duplication of data and chances of mistakes. When the...
ANALYSIS AND SECURITY TESTING OF ANDROID SYSTEM BY MALWARE DETECTION IN NETWORKS
The same principles that organizations use to monitor network traffic go into their networks must be applied to the network traffic originating from mobile devices. This means that the techniques and tools, which would...
FINITE ELEMENT ANALYSIS AND FATIGUE ANALYSIS OF SPUR GEAR UNDER RANDOM LOADING
Every component or structure is designed based on factor of safety. Which means the component should not fail below the design load. But in actual arena it is not so. There is a need for an analysis which predicts the l...
A REVIEW ON OBJECT REMOVAL USING EXAMPLER BASED IMAGE IMPAINTING TECHNIQUE
Image inpainting was historically done manually by painters for removing defect from paintings and photographs. Fill the region of missing information from a signal using surrounding information and re - form signa...
STUDY OF VARIOUS COPY MOVE FORGERY ATTACK DETECTION TECHNIQUES IN DIGITAL IMAGES
In today’s era of digital technology, security becomes a prominent issue while transferring data from one place to another place. A large amount of data is passed in form of digital images in various areas like mi...