SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 2098
Survey Paper on CP-ABE cloud computing
Poornima G. Pawar, Prof. V. D. Thombre
Department of Computer Engineering, Savitribai Phule,Pune University SKN Institute of Technology & Science, Lonavala,
Pune Maharashtra India
Abstract— In attribute based encryption (ABE) scheme,
attributes plays a very important role. Attribute –based
encryption provides privacy protection for the users by a
set of attributes. Now a days as cloud is most widely used
in mostly all fields so there is need of keeping data more
secure and confidential which is outsourced on the cloud.
Security of the data in cloud database server is the key
area of concern in the acceptance of cloud. It is required
very high degree of privacy and authentication. In
existing system used hierarchical authorization structure
to reduce the burden and risk of a single authority .this
paper proposes a hierarchical attribute based encryption
which directly provides attribute value by user as well as
data stored in different types of media.
Keywords—Access control, attribute based encryption,
multi-authority.
I. INTRODUCTION
in cloud computing, users store their data fields in cloud
server, therefore it is very important[4] to prevent
unauthorized access to these resources. cloud computing
can provide several computing compatibilities, reduce
cost and capital expenditure and change according to
usage. The most suitable variant for fine-grained access
control in the cloud cipher text policy CP-ABE.
Attribute based encryption is a version of public key
encryption that allows users to encrypt and decrypt
messages based on user attributes. Standard encryption is
insufficient when numbers of users wants to share data
between many users [7]; since the data need to be
encrypted using every users public key. In many
situations when a user encrypts sensitive data, it is
imperative that she establish a specific access control
policy on who can decrypt this data.
The scheme can be used to ensure fine-grain access
control by the set of attributes [11] owned by the user.
Attribute based encryption can be classified into two
types:
1) Key policy ABE(KP-ABE)
2) Cipher Policy ABE (CP-ABE)
1) Key Policy ABE: The access Policies are
associated with user’s private key is generated
based on the attribute values owned by the user.
2) Cipher Policy ABE: Access Policies are assigned
with the cipher text .It is more flexible compared to
KP-ABE.CP-ABE was first introduced by Amit
Sahai and Brent Waters.
II. LITERATURE SURVEY
• Title: attribute based access control for Multi
Authority System in Cloud Storage
Author: Kan Yang, Xiaohua Jia.
In this paper, a new access control framework for multi
authority systems in cloud storage and propose an
efficient and secure multi authority access control
scheme. In designed an efficient multi authority CP-ABE
scheme that does not require a global authority and can su
support LSSS access structure. We proved that our multi-
authority CP-ABE scheme provably secure in the random
oracle model. We also proposed a new technique to solve
the attribute revocation problem in multi authority CP-
ABE scheme. We will remove the random oracle and
extend our work to be provably secure in the standard
model.
• Title: Key-Policy attribute based encryption
to secure data stored in cloud
Author: C. Vinoth, G.R. Anantha Raman
In this paper the key policy attribute based encryption
scheme, which provides more secure and fine-grained
data access control in the system. It will be efficient and
scalable to securely manage user data in the system. For
key distribution the KDC is used. It is also helpful to
secure data from the unauthorized user and auditors. The
challenging problem is the construction of KP-ABE
scheme with constant cipher text size and constant cipher
text size and private key size.
• Title: Attribute based access control
Author: Prof. N.B. Kadu, Gholap Nilesh,Saraf Shashir,
Garodi Pravin, Bora Anand
Attribute based access control provide data
confidentiality. This system solves the drawbacks of role
based access control by replacing attributes instead of
roles.
We use constant size cipher text instead of depending
linearly on numbers of attributes which helps to improve
efficiency and performance. Our scheme maintains the
size of cipher text and the computation of encryption and
decryption at constant value.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 2099
• Title: System Based access control for multi
authority system with constant size cipher
text in cloud computing.
Author: Chen Yanil, Sng Linglish, Yang Geng
In this paper we presents a CP-ABE access control for
multi authority system with constant size cipher text in
cloud computing. Both the length of cipher text and the
number of pairing operations in decryption are constant
and independent of the number of attributes involved in
the access structure, which reduce the communication and
computing cost of the system. This scheme only supports
a restricted access control structure, which is AND gates
on multiple attributes.
• Title: Attribute based access control for multi
authority system with constant size cipher
text in cloud computing
Author: CHEN Yanil, SONG Lining, YANG Geng
In this paper we presents a CP-ABE access control for
multi-authority systems with constant size cipher text in
cloud computing. Both the length of cipher text and the
number of pairing operations in decryption are constant
and independent of the number of attributes involved in
the access stricter, which reduce the communication and
computing cost of multi authorities solve the escrow
problem in the single authority system.
Title : Attribute based access control with constant
size cipher text in cloud computing
Author: Wei Teng, Geng Yang, Yang Xiang, Ting
Zhang, Dongyang Wang
Scheme sharing of data plays an important role in cloud
computing. Attribute based access control can realized
data confidentiality in the untrusted environment of server
end, fine grained access control and large scale dynamic
authorization which are difficult problems to solve the
traditional access control. This paper proposes a structure
of hierarchical attribute authority. This paper proposed a
structure of hierarchical attribute authority based on cloud
computing which reduces the burden and disperses the
risk of the single authority. The propose scheme adopts
CP-ABE with constant size cipher text that solves the
problem of the cipher text size depending linearly on the
number of attribute.
III. COMPARISON TABLE
S
r
Title Author Meth
od
Used
Drawbacks
1 attribute
based
access
control
for Multi
Authorit
y System
in Cloud
Storage
Kan
Yang,
Xiaohua
Jia.
Globa
l UID
Random selection
attributes not
supported to
oracle
2 Key-
Policy
attribute
based
encryptio
n to
secure
data
stored in
cloud
C.
Vinoth,
G.R.
Anantha
Raman
Proxy
reencr
yption
protoc
ol
used
It required TPA
permission code
3 Attribute
based
access
control
Prof.
N.B.
Kadu,
Gholap
Nilesh,Sa
raf
Shashir,
Sarodi
Pravin,B
ora
Anand
Level
Doma
in
Autho
rity
Can not transfer
secure transfer
file such as
pdf,img,mp3,vide
o
4 Attribute
based
access
control
for multi
authority
system
with
constant
size
cipher
text
Chen
Yanil,
Sng
Linglish,
Yang
Geng
q-
BDH
E
It only support
restricted access
structure
5 Attribute
based
access
control
Wei
Teng,
Geng
Yang,
Hierar
chical
metho
It required more
secure
parameters..
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 2100
with
constant
size
cipher
text in
cloud
computin
g
Yang
Xiang,
Ting
Zhang,
Dongyan
g Wang
d
IV. CONCLUSION
In this paper we have studied many different techniques
for how secure data in cloud computing. Existing
methods having many drawbacks and limitations for
attribute size for future work .we can use better algorithm
to reduce burden of server and give fast throughput to the
user.
ACKNOWLEDGMENT
We would like to thanks to our guide & respected
teachers for their constant support and motivation for us.
Our sincere thanks to SKN Sinhgad Institute of
Technology and Science to develop our skill and
capabilities.
REFERENCES
[1] Attribute based access control with constant size
cipher text in cloud computing.
[2] Data management with attribute based encryption
method for sensitive users in cloud computing.
Vidyasagar Tella,L.V Ramesh.IJETR ISSN:2321-
0869,vol-2,issue-9,September 2014
[3] Attribute based encryption Optimal for cloud
computing(Mate Harvath) jan-5-2015
[4] Attribute based access control (Prof. N.B. Kadu
,Gholap Nilesh, Saraf Shashir, Garodi Pravin ,Bora
Anand. IJARIIE-ISSN(0)-2395-4396vol-2,issue-2
2016
[5] Cipher Policy Hierarchical Attribute based
encryption with short cipher text : Efficiently
sharing data among large organizations.Hua Deng,
Quanhong Wu,
[6] A Literature Survey on key aggregation system for
secure sharing of cloud data. Arun Kumar S., S.
Dhansekar IJARECE ,vlo-3, issue-(12 ,December
2014)
[7] An Efficient Presentation of Attribute Based
Encryption Design in cloud data. ISSN:2277 128X,
vol-5,issue-(2 Feb 2015)
[8] A survey on Attribute based encryption Scheme of
Access control in cloud environment .IJNS, vol-15,
no-4,pp.231-240,(July 2013)
[9] Attribute Based Access Control for Multi Authority
System in cloud storage.32nd
IEEE International
conference on Distributed computing systems
(2012)
[10]Attribute Based Access Control for multi Authority
System with Constant size Ciphertext in cloud
computing. China communucations(Feb 2016)
[11]Constant Size Ciphertext Attribute Based
Encryption with Lively membership .Saranya P. P.
Alphonsa Kurioakose(11 November 2015)
[12]Attribute Based Encryption schemes with Constant
size Cipher texts(2010)
[13]Key-Policy attribute Based Encryption to Secure
data stored in cloud IJATES vol-2,issue no-
1,(September 2014)
[14]Enhancement of Cloud Computing Security with
secure data storage using AES.IJIRST , vol-2, issue-
09,February 2016.
[15]Cryptographic protocols for secure cloud
computing.IJSIA, vol-10,no-2,pp:301-310(2016)

More Related Content

What's hot

Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...IJECEIAES
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)ElavarasaN GanesaN
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsSwathi Rampur
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsIRJET Journal
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...Venkat Projects
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...ElavarasaN GanesaN
 

What's hot (20)

Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
J018145862
J018145862J018145862
J018145862
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
H1803035056
H1803035056H1803035056
H1803035056
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...
 

Viewers also liked

an experiment on a co2 air conditioning system with copper heat exchangers
an experiment on a co2 air conditioning system with copper heat exchangersan experiment on a co2 air conditioning system with copper heat exchangers
an experiment on a co2 air conditioning system with copper heat exchangersINFOGAIN PUBLICATION
 
development of high speed gas gun with a new trigger system
development of high speed gas gun with a new trigger systemdevelopment of high speed gas gun with a new trigger system
development of high speed gas gun with a new trigger systemINFOGAIN PUBLICATION
 
development of a novel keyboard interface unit for writing quran using computer
development of a novel keyboard interface unit for writing quran using computerdevelopment of a novel keyboard interface unit for writing quran using computer
development of a novel keyboard interface unit for writing quran using computerINFOGAIN PUBLICATION
 
implementing training and skills investment policy for effective performance ...
implementing training and skills investment policy for effective performance ...implementing training and skills investment policy for effective performance ...
implementing training and skills investment policy for effective performance ...INFOGAIN PUBLICATION
 
osmotic dehydration as a tool for insdustrialization of jabuticaba peel (myrc...
osmotic dehydration as a tool for insdustrialization of jabuticaba peel (myrc...osmotic dehydration as a tool for insdustrialization of jabuticaba peel (myrc...
osmotic dehydration as a tool for insdustrialization of jabuticaba peel (myrc...INFOGAIN PUBLICATION
 
нарийн гэдсэнд хоол боловсрох
нарийн гэдсэнд хоол боловсрохнарийн гэдсэнд хоол боловсрох
нарийн гэдсэнд хоол боловсрохdulmaa munkhbat
 
Ahmed-Hamdy-CV2016
Ahmed-Hamdy-CV2016Ahmed-Hamdy-CV2016
Ahmed-Hamdy-CV2016Ahmed Hamdy
 
identifying malevolent facebook requests
identifying malevolent facebook requestsidentifying malevolent facebook requests
identifying malevolent facebook requestsINFOGAIN PUBLICATION
 
Eng. Essam Ahmed CV
Eng. Essam Ahmed CV Eng. Essam Ahmed CV
Eng. Essam Ahmed CV Essam Ahmed
 
打造精彩人生的十組關鍵字 by 傑克飛
打造精彩人生的十組關鍵字 by 傑克飛打造精彩人生的十組關鍵字 by 傑克飛
打造精彩人生的十組關鍵字 by 傑克飛Jackfir Tsai
 
Food safety and quality management regulatory systems in afghanistan 2016
Food safety and quality management regulatory systems in afghanistan   2016Food safety and quality management regulatory systems in afghanistan   2016
Food safety and quality management regulatory systems in afghanistan 2016Naim Khalid
 
Adnan -updated CV
Adnan -updated CVAdnan -updated CV
Adnan -updated CVAdnan TV
 
Msc. synopsis OAT Genetic diversity and molecular markers
Msc. synopsis OAT Genetic diversity and molecular markersMsc. synopsis OAT Genetic diversity and molecular markers
Msc. synopsis OAT Genetic diversity and molecular markersArushi Arora
 
Its for big hindi film released @cinema industry – cinema hall with film to ...
Its for big hindi film released @cinema industry – cinema hall with  film to ...Its for big hindi film released @cinema industry – cinema hall with  film to ...
Its for big hindi film released @cinema industry – cinema hall with film to ...Deepak Somaji-Sawant
 
Edwin Suryadi, Internship CV, Resume, Coverletter
Edwin Suryadi, Internship CV, Resume, CoverletterEdwin Suryadi, Internship CV, Resume, Coverletter
Edwin Suryadi, Internship CV, Resume, CoverletterEdwin Suryadi
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportAbdul Rehman
 

Viewers also liked (19)

an experiment on a co2 air conditioning system with copper heat exchangers
an experiment on a co2 air conditioning system with copper heat exchangersan experiment on a co2 air conditioning system with copper heat exchangers
an experiment on a co2 air conditioning system with copper heat exchangers
 
development of high speed gas gun with a new trigger system
development of high speed gas gun with a new trigger systemdevelopment of high speed gas gun with a new trigger system
development of high speed gas gun with a new trigger system
 
Lean supply chain management
Lean supply chain managementLean supply chain management
Lean supply chain management
 
development of a novel keyboard interface unit for writing quran using computer
development of a novel keyboard interface unit for writing quran using computerdevelopment of a novel keyboard interface unit for writing quran using computer
development of a novel keyboard interface unit for writing quran using computer
 
implementing training and skills investment policy for effective performance ...
implementing training and skills investment policy for effective performance ...implementing training and skills investment policy for effective performance ...
implementing training and skills investment policy for effective performance ...
 
osmotic dehydration as a tool for insdustrialization of jabuticaba peel (myrc...
osmotic dehydration as a tool for insdustrialization of jabuticaba peel (myrc...osmotic dehydration as a tool for insdustrialization of jabuticaba peel (myrc...
osmotic dehydration as a tool for insdustrialization of jabuticaba peel (myrc...
 
нарийн гэдсэнд хоол боловсрох
нарийн гэдсэнд хоол боловсрохнарийн гэдсэнд хоол боловсрох
нарийн гэдсэнд хоол боловсрох
 
my cv upto 2015 june
my cv upto 2015 junemy cv upto 2015 june
my cv upto 2015 june
 
Ahmed-Hamdy-CV2016
Ahmed-Hamdy-CV2016Ahmed-Hamdy-CV2016
Ahmed-Hamdy-CV2016
 
identifying malevolent facebook requests
identifying malevolent facebook requestsidentifying malevolent facebook requests
identifying malevolent facebook requests
 
P&g
P&gP&g
P&g
 
Eng. Essam Ahmed CV
Eng. Essam Ahmed CV Eng. Essam Ahmed CV
Eng. Essam Ahmed CV
 
打造精彩人生的十組關鍵字 by 傑克飛
打造精彩人生的十組關鍵字 by 傑克飛打造精彩人生的十組關鍵字 by 傑克飛
打造精彩人生的十組關鍵字 by 傑克飛
 
Food safety and quality management regulatory systems in afghanistan 2016
Food safety and quality management regulatory systems in afghanistan   2016Food safety and quality management regulatory systems in afghanistan   2016
Food safety and quality management regulatory systems in afghanistan 2016
 
Adnan -updated CV
Adnan -updated CVAdnan -updated CV
Adnan -updated CV
 
Msc. synopsis OAT Genetic diversity and molecular markers
Msc. synopsis OAT Genetic diversity and molecular markersMsc. synopsis OAT Genetic diversity and molecular markers
Msc. synopsis OAT Genetic diversity and molecular markers
 
Its for big hindi film released @cinema industry – cinema hall with film to ...
Its for big hindi film released @cinema industry – cinema hall with  film to ...Its for big hindi film released @cinema industry – cinema hall with  film to ...
Its for big hindi film released @cinema industry – cinema hall with film to ...
 
Edwin Suryadi, Internship CV, Resume, Coverletter
Edwin Suryadi, Internship CV, Resume, CoverletterEdwin Suryadi, Internship CV, Resume, Coverletter
Edwin Suryadi, Internship CV, Resume, Coverletter
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 

Similar to survey paper on cp abe cloud computing

A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET Journal
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueIRJET Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Naveena N
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computingijsrd.com
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...ijsrd.com
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud ComputingAn Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computingijtsrd
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 

Similar to survey paper on cp abe cloud computing (20)

A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
C04932125
C04932125C04932125
C04932125
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
Ijcatr04051007
Ijcatr04051007Ijcatr04051007
Ijcatr04051007
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud ComputingAn Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 

Recently uploaded

the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

survey paper on cp abe cloud computing

  • 1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 2098 Survey Paper on CP-ABE cloud computing Poornima G. Pawar, Prof. V. D. Thombre Department of Computer Engineering, Savitribai Phule,Pune University SKN Institute of Technology & Science, Lonavala, Pune Maharashtra India Abstract— In attribute based encryption (ABE) scheme, attributes plays a very important role. Attribute –based encryption provides privacy protection for the users by a set of attributes. Now a days as cloud is most widely used in mostly all fields so there is need of keeping data more secure and confidential which is outsourced on the cloud. Security of the data in cloud database server is the key area of concern in the acceptance of cloud. It is required very high degree of privacy and authentication. In existing system used hierarchical authorization structure to reduce the burden and risk of a single authority .this paper proposes a hierarchical attribute based encryption which directly provides attribute value by user as well as data stored in different types of media. Keywords—Access control, attribute based encryption, multi-authority. I. INTRODUCTION in cloud computing, users store their data fields in cloud server, therefore it is very important[4] to prevent unauthorized access to these resources. cloud computing can provide several computing compatibilities, reduce cost and capital expenditure and change according to usage. The most suitable variant for fine-grained access control in the cloud cipher text policy CP-ABE. Attribute based encryption is a version of public key encryption that allows users to encrypt and decrypt messages based on user attributes. Standard encryption is insufficient when numbers of users wants to share data between many users [7]; since the data need to be encrypted using every users public key. In many situations when a user encrypts sensitive data, it is imperative that she establish a specific access control policy on who can decrypt this data. The scheme can be used to ensure fine-grain access control by the set of attributes [11] owned by the user. Attribute based encryption can be classified into two types: 1) Key policy ABE(KP-ABE) 2) Cipher Policy ABE (CP-ABE) 1) Key Policy ABE: The access Policies are associated with user’s private key is generated based on the attribute values owned by the user. 2) Cipher Policy ABE: Access Policies are assigned with the cipher text .It is more flexible compared to KP-ABE.CP-ABE was first introduced by Amit Sahai and Brent Waters. II. LITERATURE SURVEY • Title: attribute based access control for Multi Authority System in Cloud Storage Author: Kan Yang, Xiaohua Jia. In this paper, a new access control framework for multi authority systems in cloud storage and propose an efficient and secure multi authority access control scheme. In designed an efficient multi authority CP-ABE scheme that does not require a global authority and can su support LSSS access structure. We proved that our multi- authority CP-ABE scheme provably secure in the random oracle model. We also proposed a new technique to solve the attribute revocation problem in multi authority CP- ABE scheme. We will remove the random oracle and extend our work to be provably secure in the standard model. • Title: Key-Policy attribute based encryption to secure data stored in cloud Author: C. Vinoth, G.R. Anantha Raman In this paper the key policy attribute based encryption scheme, which provides more secure and fine-grained data access control in the system. It will be efficient and scalable to securely manage user data in the system. For key distribution the KDC is used. It is also helpful to secure data from the unauthorized user and auditors. The challenging problem is the construction of KP-ABE scheme with constant cipher text size and constant cipher text size and private key size. • Title: Attribute based access control Author: Prof. N.B. Kadu, Gholap Nilesh,Saraf Shashir, Garodi Pravin, Bora Anand Attribute based access control provide data confidentiality. This system solves the drawbacks of role based access control by replacing attributes instead of roles. We use constant size cipher text instead of depending linearly on numbers of attributes which helps to improve efficiency and performance. Our scheme maintains the size of cipher text and the computation of encryption and decryption at constant value.
  • 2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 2099 • Title: System Based access control for multi authority system with constant size cipher text in cloud computing. Author: Chen Yanil, Sng Linglish, Yang Geng In this paper we presents a CP-ABE access control for multi authority system with constant size cipher text in cloud computing. Both the length of cipher text and the number of pairing operations in decryption are constant and independent of the number of attributes involved in the access structure, which reduce the communication and computing cost of the system. This scheme only supports a restricted access control structure, which is AND gates on multiple attributes. • Title: Attribute based access control for multi authority system with constant size cipher text in cloud computing Author: CHEN Yanil, SONG Lining, YANG Geng In this paper we presents a CP-ABE access control for multi-authority systems with constant size cipher text in cloud computing. Both the length of cipher text and the number of pairing operations in decryption are constant and independent of the number of attributes involved in the access stricter, which reduce the communication and computing cost of multi authorities solve the escrow problem in the single authority system. Title : Attribute based access control with constant size cipher text in cloud computing Author: Wei Teng, Geng Yang, Yang Xiang, Ting Zhang, Dongyang Wang Scheme sharing of data plays an important role in cloud computing. Attribute based access control can realized data confidentiality in the untrusted environment of server end, fine grained access control and large scale dynamic authorization which are difficult problems to solve the traditional access control. This paper proposes a structure of hierarchical attribute authority. This paper proposed a structure of hierarchical attribute authority based on cloud computing which reduces the burden and disperses the risk of the single authority. The propose scheme adopts CP-ABE with constant size cipher text that solves the problem of the cipher text size depending linearly on the number of attribute. III. COMPARISON TABLE S r Title Author Meth od Used Drawbacks 1 attribute based access control for Multi Authorit y System in Cloud Storage Kan Yang, Xiaohua Jia. Globa l UID Random selection attributes not supported to oracle 2 Key- Policy attribute based encryptio n to secure data stored in cloud C. Vinoth, G.R. Anantha Raman Proxy reencr yption protoc ol used It required TPA permission code 3 Attribute based access control Prof. N.B. Kadu, Gholap Nilesh,Sa raf Shashir, Sarodi Pravin,B ora Anand Level Doma in Autho rity Can not transfer secure transfer file such as pdf,img,mp3,vide o 4 Attribute based access control for multi authority system with constant size cipher text Chen Yanil, Sng Linglish, Yang Geng q- BDH E It only support restricted access structure 5 Attribute based access control Wei Teng, Geng Yang, Hierar chical metho It required more secure parameters..
  • 3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 2100 with constant size cipher text in cloud computin g Yang Xiang, Ting Zhang, Dongyan g Wang d IV. CONCLUSION In this paper we have studied many different techniques for how secure data in cloud computing. Existing methods having many drawbacks and limitations for attribute size for future work .we can use better algorithm to reduce burden of server and give fast throughput to the user. ACKNOWLEDGMENT We would like to thanks to our guide & respected teachers for their constant support and motivation for us. Our sincere thanks to SKN Sinhgad Institute of Technology and Science to develop our skill and capabilities. REFERENCES [1] Attribute based access control with constant size cipher text in cloud computing. [2] Data management with attribute based encryption method for sensitive users in cloud computing. Vidyasagar Tella,L.V Ramesh.IJETR ISSN:2321- 0869,vol-2,issue-9,September 2014 [3] Attribute based encryption Optimal for cloud computing(Mate Harvath) jan-5-2015 [4] Attribute based access control (Prof. N.B. Kadu ,Gholap Nilesh, Saraf Shashir, Garodi Pravin ,Bora Anand. IJARIIE-ISSN(0)-2395-4396vol-2,issue-2 2016 [5] Cipher Policy Hierarchical Attribute based encryption with short cipher text : Efficiently sharing data among large organizations.Hua Deng, Quanhong Wu, [6] A Literature Survey on key aggregation system for secure sharing of cloud data. Arun Kumar S., S. Dhansekar IJARECE ,vlo-3, issue-(12 ,December 2014) [7] An Efficient Presentation of Attribute Based Encryption Design in cloud data. ISSN:2277 128X, vol-5,issue-(2 Feb 2015) [8] A survey on Attribute based encryption Scheme of Access control in cloud environment .IJNS, vol-15, no-4,pp.231-240,(July 2013) [9] Attribute Based Access Control for Multi Authority System in cloud storage.32nd IEEE International conference on Distributed computing systems (2012) [10]Attribute Based Access Control for multi Authority System with Constant size Ciphertext in cloud computing. China communucations(Feb 2016) [11]Constant Size Ciphertext Attribute Based Encryption with Lively membership .Saranya P. P. Alphonsa Kurioakose(11 November 2015) [12]Attribute Based Encryption schemes with Constant size Cipher texts(2010) [13]Key-Policy attribute Based Encryption to Secure data stored in cloud IJATES vol-2,issue no- 1,(September 2014) [14]Enhancement of Cloud Computing Security with secure data storage using AES.IJIRST , vol-2, issue- 09,February 2016. [15]Cryptographic protocols for secure cloud computing.IJSIA, vol-10,no-2,pp:301-310(2016)