Privacy Preservation in Cloud Using Attribute Based Encryption
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4
Abstract
Abstract- Security and privacy are very important issues in cloud computing. In existing system access control in clouds are centralized in nature. The scheme uses a symmetric key approach and does not support authentication. Symmetric key algorithm uses same key for both encryption and decryption. A single Key Distribution Centre (KDC) distributes secret keys and attributes to all users. A new decentralized access control scheme for secure data storage in clouds that supportsanonymous authentication is developed. The validity of the user who stores the data is also verified. The proposed scheme is resilient to replay attacks. In thisscheme. Data Owner can share the data and it-s Key to the Permitted users. Data Sharing is achieved for three types of users. 1. User Based 2. Role Based (Position / Role), 3. Attribute (Experience). Data is uploaded by the Data Owner based on public key, secret key, Global key and Group key. Public key is randomly generated. Secret key & group key is generated via Attribute. Global key is generated randomly.We encrypt the uploaded file using ABE Algorithm.
The Role of Perceived Organizational Politics (POP) in Examining Organizational Citizenship Behaviors (OCBs); Taking Self-monitoring as Moderator
Organizational politics is one of the important issues arising at workplace. Individuals who are involved in office politics not only consume time and resource in order to gain their own benefits at the cost of company o...
Nutritional Parameters for Growth Profile Study of Protease Producing Halotolerant Bacteria from Mining Site of Kutch, Gujarat
Nutritional Parameters for Growth Profile Study of Protease Producing Halotolerant Bacteria from Mining Site of Kutch, Gujarat
Adsorption Studies for Organic Matter Removal from Wastewater by Using Bagasse Flyash in Batch and Column Operations
The affordable and effective treatment of wastewater is critical issue for the developing countries. Various conventional treatment techniques; both biological and nonbiological are being tried. Disposal of domestic sewa...
Integrated Approach to Detect Vulnerabilities in Source Code
Nowadays, security breaches are greatly increasing in number. This is one of the major threats that are being faced by most organisations which usually lead to a massive loss. The major cause for these breaches could pot...
Political Economy and the Local Governance in Kenya during the Pre - August 2010 Constitution: A Synoptic Review
"This paper explores how changing economic circumstances have affected performance of the government, in terms of governance, during the pre-August 2010 Constitutional dispensation. Further, the review introduces issues...