Privacy Preservation in Cloud Using Attribute Based Encryption

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4

Abstract

Abstract- Security and privacy are very important issues in cloud computing. In existing system access control in clouds are centralized in nature. The scheme uses a symmetric key approach and does not support authentication. Symmetric key algorithm uses same key for both encryption and decryption. A single Key Distribution Centre (KDC) distributes secret keys and attributes to all users. A new decentralized access control scheme for secure data storage in clouds that supportsanonymous authentication is developed. The validity of the user who stores the data is also verified. The proposed scheme is resilient to replay attacks. In thisscheme. Data Owner can share the data and it-s Key to the Permitted users. Data Sharing is achieved for three types of users. 1. User Based 2. Role Based (Position / Role), 3. Attribute (Experience). Data is uploaded by the Data Owner based on public key, secret key, Global key and Group key. Public key is randomly generated. Secret key & group key is generated via Attribute. Global key is generated randomly.We encrypt the uploaded file using ABE Algorithm.

Authors and Affiliations

Keywords

Related Articles

Energy Consumption in Key Management Operations in WSNs

This paper gives an illustration and demonstration of mathematical model of new key management scheme which overcomes the limitation of Pre-Shared key scheme in terms of energy consumption using various key management op...

Launch Time Application Security: The Trusted Approach

Launch Time Application Security: The Trusted Approach

Real Time and Secure Video Transmission using Open MPI and Open MP

Real Time and Secure Video Transmission using Open MPI and Open MP

Bridging Understanding in Medicare: Template for Effective Communication in Indigenous Languages

One of the implications of globalization is to include all possible stakeholders in every enterprise, taking into consideration all enabling variables. The maintenance of a good patient-doctor relationship otherwise know...

Roadmap to Prominence of Woman

This paper shows the change in position of women from one civilization to other. It also shows the major humiliating changes which came into the society. It reflects how women asserted her equality with men. With the ris...

Download PDF file
  • EP ID EP366315
  • DOI -
  • Views 95
  • Downloads 0

How To Cite

(2015). Privacy Preservation in Cloud Using Attribute Based Encryption. International Journal of Science and Research (IJSR), 4(4), -. https://europub.co.uk/articles/-A-366315