UNDERSTANDING THE DIFFERENT VULNERABILITY METHODS OF ATTACKS IN SECURE DATA
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 4, Issue 8
Abstract
Cipher text-policy attribute based encryption (CPABE) provides an encrypted access control mechanism for broadcasting messages. Basically, a sender encrypts a message with an access control policy tree which is logically composed of attributes; receivers are able to decrypt the message when their attributes satisfy the policy tree. A user’s attributes stand for the properties that he current has. It is required for a user to keep his attributes up-to-date. However, this is not easy in CP-ABE because whenever one attribute changes, the entire private key, which is based on all the attributes, must be changed. In this paper, we introduce fading function, which renders attributes ”dynamic” and allows us to update each one of them separately. We study how choosing fading rate for fading function affects the efficiency and security. We also compare our design with CP-ABE and find our scheme performs significantly better under certain circumstance.
Authors and Affiliations
S. Padmaja*
HUMAN MOTION DETECTION USING PIR SENSOR
The objective of this project is to develop a motion sensor alarm based working on Passive Infra-Red (PIR) sensor module. There are many sellers that manufacture the PIR sensor modules are all method most the same in f...
FUTURE GLOBAL – MEAN TEMPERATURE CHANGES
The green house problem, global-mean temperature charge. As this variable changes, all other climate variables will change in concert. At the regional level, large changes in temperature are expected. This will va...
GAMMA – RAY SPECTROSCOPY USING NAI(TL) DETECTOR
An attempted work had been made on the basic principle that when a radiation interactedwith the detector material, it was absorbing by the material and emitting flash of light, i.e, scintillation. The Thallium...
INVERTERS CURRENT FREQUENCY DEVIATION BASED ISLANDING DETECTION IN GRID CONNECTED PHOTOVOLTAIC SYSTEM
The protection schemes of distribution systems are usually designed under the assumption that power flows from the substations to the end users.The utility system contains both load and generation in which part of...
SIMULATION A DYNAMIC MODELING THEORY OF STEAM TURBINE BASED ON AGENTIC A LOGARITHM
In the present paper, a thermodynamic analysis of steam turbine type (K–800–23.5–0.034), power plant has been carried out. The power plant system was simulated and a detailed parametric study undertaken, which inv...