SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6195
Attribute Based Access Control for Cloud Data Storage
Ninad Harke1, Vishal Sherkar2, Ajay Hadal3, Nitin Dhawas3
1,2,3Student, Dept. IT Engineering, PCET’s NMIET Pune, Maharashtra, India
4 Professor, Dept. IT Engineering, PCET’s NMIET Pune, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Fine grained access management could be a
demand for knowledge stored in untrusted servers like clouds.
Due to the massive volume of data, redistributed key
management schemes square measure most popular over
centralized ones. Usually coding and cryptography square
measure quite expensive and not sensible once user’s access
knowledge from resource constrained devices. We tend to
propose a redistributed attribute primarily based encryption
(ABE) method with quick coding, outsourced cryptography
and user revocation. Our scheme is incredibly specific to the
context of mobile cloud because the storage of encrypted
knowledge and therefore the partial decryption of cipher text
square measure keen about the cloud and users with mobile
devices will transfer knowledge to the cloud or access
knowledge from it by acquisition little value for coding and
cryptography respectively. The most plans is to divide the
coding into 2 phases, offline pre-processing part that is
completed once the device is otherwise not in use and an
internet part once the info is truly encrypted with the policy.
This makes coding quicker and a lot of efficient than existing
decentralized ABE schemes. Wealsointroduceuserrevocation
during this theme while not acquisition too much additional
value within the on-line part. Comparison with other ABE
themes shows that our scheme considerably reduces
computation times for each knowledge house owners and
knowledge users and extremely suitable to be used in mobile
devices.
Key Words: Attribute-based Encryption, User
Revocation, Cloud Computing, Decentralized Key
Management, Mobile Devices
1. INTRODUCTION
Consider the common situation wherever information
homeowners wish to transfer their information for
semi-permanent storage to untrusted servers like the
cloud [1]. The info might be initio reside in resource
forced devices like mobile phones, wireless sensors or
smartcards. The aim is to store the info over an
extended time and permit multiple users to access the
info. This information is sensitive and also the hospital
might want solely the doctor attending a patient or a
research worker concerned within the drug discovery
to possess access to the info [4]. Secret writing
schemes like attribute based secretwriting(ABE)offer
nice flexibility in terms of access management on
encrypted information and square measure ideal for
this situation [2],[3]. In observe, suburbanized or
multi-authority ABE schemes square measure terribly
helpful as they are doing not would like any central
authority for generation and distribution of decoding
keys associated with totally different attributes. For
instance, the doctor UN agency needs to access a
patient’s health record for designationisalsoprovided
the relevant key by the hospital however a medical
research worker is also given access to constant
information by a medical analysis organization. We
tend to propose a suburbanizedattributebasedmostly
secret writing (ABE) theme with quick secret writing,
outsourced decoding and user revocation [7].
Our theme is incredibly specific to the context
of mobile cloud because the storage of encrypted
information and also the partial decoding of cipher
texts square measure passionate about the cloud and
users with mobile devices will transfer information to
the cloud or access information from it by acquisition
little or no value for secret writing and de- 2 coding
severally. As an answer to the pricey secret writing
downside, we tendtodividethesecretwritingpartinto
associate offline part and an internet part, such that,
most of the pricey operations square measure
performed offline once the user doesn’t at once expect
the secret writing to be completed, the device is
charging or otherwise not in use the web part has very
little computations in order that users will get on with
their work while not the devices performance being
affected in any respect [5]. Information user’s square
measure eased from activity pricey decoding
operations by outsourcing such operations to a proxy
server.
The proxy server, employing a reworked
decoding key, partlydecryptstheciphertext.However,
the partial decoding method doesn’t reveal any info to
the malicious proxy server. Then, the info user has to
perform solelyanumberofstraightforwardoperations
to derive the ultimate plaintext from the partly
decrypted cipher text. Similarly, revocation keys are
generated offline, with a number of computations
within the on-line part for key transformation before
they’re given to the proxy server [1], [2].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6196
2. Existing Methodology
2.1 Improving Privacy and Security in Multi-
Authority Attribute- Based Encryption
Attribute based encryption (ABE) determines
coding ability supported a user’s attributes in a very multi-
authority ABE scheme, multiple attribute authorities
monitor totally different sets of attributes and issue
corresponding decryption keys to users, and encryptions
will require that a user acquire keys for applicableattributes
from every authority before decrypting a message [1].
2.2 Identity Based and Attribute Based
Cryptography: A Survey
Changing scenario of cryptography has led to a
modification in paradigm of from certificate primarilybased
public keys and key rings to user- dependent keys that are
based on identities of users or their attributes. This is often
termed as identity based mostly cryptography or attribute
based cryptography [2].
2.3 A Survey of Attribute-basedAccessControlwith
User Revocation in Cloud Data Storage.
Cipher text-policy attribute-based encryption may be a
promising cryptologic resolution in cloud environment,
which might be concerned for access management by the
information owner to dene access policy [3]. Sadly, an
outsourced architecture applied with the attribute-based
encryption introduces several challenges during which one
among the challenges is revocation [8]. The problem may be
a threat to information security within the information
owner.
Fig. 1 The cloud storage architecture of attribute-based
access control
2.4 Attribute-based data access control in mobile
cloud computing: Taxonomy and open issues
ABE strategies and categorizes them into 3 main
categories, like centralized, decentralized, and hierarchic,
supported their architectures. We tend to conjointly
analysed the various ABE techniques to determine the
benefits and drawbacks, the importance and needs, and
identifies the analysis gaps [4].
3. Scope
Our system can be used on daily basis instead of encrypting
each part of a log with the keys of all recipients; it is possible
to encrypt the log only with attributes which match
recipients’ attributes. This primitive can also be used for
broadcast encryption in order to decrease the number of
keys used.
4. Motivation
Access control is a requirement for data stored in untrusted
servers like clouds. Often encryption and decryption are
quite expensive and not practical when users access data
from resource. Above mention problem exist in cloud
computing so idea of Decentralized Attribute Based Access
Control for cloud came in existence.
5. Disadvantages of Existing System
1. Single trusted party who storedata andmonitorsall
attributes.
2. We initial review some important Identity based
encryption, signature and encryption schemes.
3. The problem may be a threat to information
security within the information owner.
4. Taxonomyofattribute-basedapproachessupported
important parameters, like access management
mode, design, revocation mode, revocation
technique, revocation issue, and revocation
controller.
6. Proposed System
We propose a decentralized attribute primarily based
encryption (ABE) theme with quick secret writing,
outsourced cryptography and user revocation. Our theme is
incredibly specific to the context ofmobilecloudbecausethe
storage of encrypted information and also the partial
decryption of cipher texts square measure smitten by the
cloud and users with mobile devices will transfer
information to the cloud or access information from it by
acquisition little or no value for secret writing and
cryptography respectively the most plan is to divide the
secret writing into 2 phases, offline pre-processing section
that is finished once the device is otherwisenotinuseand an
internet section once the information is really encrypted
with the policy. This makes secret writing quicker and a lot
of efficient than existing decentralized ABE schemes. For
cryptography outsourcing,informationusersgottogenerate
a remodeled version of the cryptography key permitting
associate degree untrusted proxy server to partly decrypt
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6197
the cipher text while not gaining any info regarding the
plaintext.
Information users will then absolutely rewrite the partly
decrypted cipher text while not performing arts any pricey
pairing operations.Wealsointroduceuserrevocationduring
this theme while not acquisition too much extra valuewithin
the on-line section. Comparison with other ABE themes
shows that our scheme considerably reduces computation
times for each information homeowners and information
users and extremely suitable to be used in mobile devices.
7. Advantages of Proposed system
1. Single trusted party who storedata andmonitorsall
attributes and issues all decryption keys.
2. Attribute based cryptography and encryption.
3. Data owner only can modify access policy.
4. Fast encryption, outsourced decryption and user
revocation.
8. Modules
8.1 Data Owner
Data owner should be free to upload their files to
the concern attribute. The system must identify each file
with an automatically generated file Id, for future reference.
System generates secret code and sent to data owner email
and that secret code is required to upload file. Data owner
should be allowed to check the status of their file, by using
the unique file Id provided by the system. The system must
display the file along with the details to the data owner,after
uploading the file.
8.2 Data User
The data user should be able to see the uploaded
files, which are uploaded by the data owner to specified
attribute data user only. Data user can download files by
sending key request if attribute authority send key to data
user then and then data user can download files. Data user
can check there key request status. A password protection
with secure mode option is provided to guard from
unauthorized access to database.
8.3 Attribute Authority
Attribute Authority can send response to key
request coming from data user to download file. Attribute
authority is mainly working on key management.
8.4 Proxy Server
Proxy server is a server who can encrypt and
decrypt files. AES Asymmetric Encryption Standards is used
for encryption and decryption.
8.4 Admin
Admin is a super user who has access of everything.
Admin can manage users of the system.
9. System design
Software design sits at the technical kernel of the
software engineering process and is applied regardless of
the development paradigm and area is the first step in the
development phase for any engineered product or system.
The designer’s goal is to produce a model or representation
of an entity that will later be built. Beginning, once system
requirement have been specified and analyzed, designisthe
first of the three technical activities - design, code and test
that is required to build and verify software.
Fig -2: Proposed System design
10. CONCLUSIONS
Encryption mechanisms based on user identities
and attributes hold a great promiseforchangingscenariosof
computing, namely cloud computing and ubiquitous
computing. These schemes relate a key with a set of
attributes and thus alleviate the problem of key generation
and distribution of PKI. Also, the concepts of such schemes
can be used to further design trust and security y
mechanisms for data storage in cloud.
In this paper we build a CPABE scheme in prime
order. As pointed out by the proof of the scheme is in the
generic group model using random oracles. The reason for
using prime order groups is that the schemes are efficient
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6198
with faster group operations. Our construction can be used
to design a scheme in Composite order group, which though
inefficient, rests on stronger notions of security in the dual
system encryption model.
REFERENCES
[1] N. Attrapadung and H. Imai. Attribute-based encryption
supporting direct/indirect revocation modes. In
Cryptography and Coding, pages 278– 300. Springer,
2009.
[2] N. Attrapadung and H. Imai. Conjunctive broadcast and
attribute-based encryption. In Pairing-Based
Cryptography-Pairing 2009: Third International
Conference Palo Alto, CA, USA, August 12-14, 2009
Proceedings, volume 5671,page248.SpringerScience&
Business Media, 2009.
[3] N. Balani and S. Ruj. Temporal access control with user
revocation for cloud data. In 13th IEEE International
Conference on Trust, Security and PrivacyinComputing
and Communications, TrustCom 2014, Beijing, China,
September 24-26, 2014, pages 336–343, 2014.
[4] A. Beimel. Secure schemes for secret sharing and key
distribution. Ph.D. Thesis, Israel Institute of Technolgy,
Technion, Haifa, Israel, 1996.
[5] J. Bethencourt, A. Sahai, and B.Waters.Ciphertext-policy
attribute-based encryption.In2007IEEESymposiumon
Security and Privacy (S&P 2007), 20-23 May 2007,
Oakland, California, USA, pages 321–334. IEEE
Computer Society, 2007.
[6] A. Boldyreva, V. Goyal, and V. Kumar. Identity-based
encryption with efficient revocation. In Proceedings of
the 15th ACM conference on Computer and
communications security, pages 417–426. ACM, 2008.
[7] R. Canetti, H. Krawczyk, and J. B. Nielsen. Relaxing
chosen-ciphertext security. In D. Boneh, editor,
Advances in Cryptology - CRYPTO 2003, 23rd Annual
International Cryptology Conference, Santa Barbara,
California, USA, August 17-21, 2003, Proceedings,
volume 2729 of Lecture Notes in Computer Science,
pages 565–582. Springer, 2003.
[8] M. Chase. Multi-authority attribute based encryption.In
Proceedings of Theory of Cryptography, 4th Theory of
Cryptography Conference, TCC 2007, Amsterdam, The
Netherlands, February 21-24, 2007 [8], pages515– 534.
[9] M. Chase and S. S. M. Chow. Improving privacy and
security in multi-authority attribute-based encryption.
In Proceedings of the 2009 ACM Conference on
Computer and Communications Security, CCS 2009,
Chicago, Illinois, USA, November 9-13, 2009 [9], pages
121–130.

More Related Content

What's hot

Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudIRJET Journal
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityEditor IJCATR
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudIRJET Journal
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
 
It pp hybrid attribute- and re-encryption-based key management for secure and...
It pp hybrid attribute- and re-encryption-based key management for secure and...It pp hybrid attribute- and re-encryption-based key management for secure and...
It pp hybrid attribute- and re-encryption-based key management for secure and...Papitha Velumani
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET Journal
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET Journal
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...IRJET Journal
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 
Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414Editor IJARCET
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingIJERA Editor
 
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...IRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Finalyearprojects Toall
 

What's hot (20)

Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
It pp hybrid attribute- and re-encryption-based key management for secure and...
It pp hybrid attribute- and re-encryption-based key management for secure and...It pp hybrid attribute- and re-encryption-based key management for secure and...
It pp hybrid attribute- and re-encryption-based key management for secure and...
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud Computing
 
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 

Similar to Attribute-Based Access Control for Cloud Data Storage

Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSIRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET Journal
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET Journal
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 

Similar to Attribute-Based Access Control for Cloud Data Storage (20)

Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
C04932125
C04932125C04932125
C04932125
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

Attribute-Based Access Control for Cloud Data Storage

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6195 Attribute Based Access Control for Cloud Data Storage Ninad Harke1, Vishal Sherkar2, Ajay Hadal3, Nitin Dhawas3 1,2,3Student, Dept. IT Engineering, PCET’s NMIET Pune, Maharashtra, India 4 Professor, Dept. IT Engineering, PCET’s NMIET Pune, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Fine grained access management could be a demand for knowledge stored in untrusted servers like clouds. Due to the massive volume of data, redistributed key management schemes square measure most popular over centralized ones. Usually coding and cryptography square measure quite expensive and not sensible once user’s access knowledge from resource constrained devices. We tend to propose a redistributed attribute primarily based encryption (ABE) method with quick coding, outsourced cryptography and user revocation. Our scheme is incredibly specific to the context of mobile cloud because the storage of encrypted knowledge and therefore the partial decryption of cipher text square measure keen about the cloud and users with mobile devices will transfer knowledge to the cloud or access knowledge from it by acquisition little value for coding and cryptography respectively. The most plans is to divide the coding into 2 phases, offline pre-processing part that is completed once the device is otherwise not in use and an internet part once the info is truly encrypted with the policy. This makes coding quicker and a lot of efficient than existing decentralized ABE schemes. Wealsointroduceuserrevocation during this theme while not acquisition too much additional value within the on-line part. Comparison with other ABE themes shows that our scheme considerably reduces computation times for each knowledge house owners and knowledge users and extremely suitable to be used in mobile devices. Key Words: Attribute-based Encryption, User Revocation, Cloud Computing, Decentralized Key Management, Mobile Devices 1. INTRODUCTION Consider the common situation wherever information homeowners wish to transfer their information for semi-permanent storage to untrusted servers like the cloud [1]. The info might be initio reside in resource forced devices like mobile phones, wireless sensors or smartcards. The aim is to store the info over an extended time and permit multiple users to access the info. This information is sensitive and also the hospital might want solely the doctor attending a patient or a research worker concerned within the drug discovery to possess access to the info [4]. Secret writing schemes like attribute based secretwriting(ABE)offer nice flexibility in terms of access management on encrypted information and square measure ideal for this situation [2],[3]. In observe, suburbanized or multi-authority ABE schemes square measure terribly helpful as they are doing not would like any central authority for generation and distribution of decoding keys associated with totally different attributes. For instance, the doctor UN agency needs to access a patient’s health record for designationisalsoprovided the relevant key by the hospital however a medical research worker is also given access to constant information by a medical analysis organization. We tend to propose a suburbanizedattributebasedmostly secret writing (ABE) theme with quick secret writing, outsourced decoding and user revocation [7]. Our theme is incredibly specific to the context of mobile cloud because the storage of encrypted information and also the partial decoding of cipher texts square measure passionate about the cloud and users with mobile devices will transfer information to the cloud or access information from it by acquisition little or no value for secret writing and de- 2 coding severally. As an answer to the pricey secret writing downside, we tendtodividethesecretwritingpartinto associate offline part and an internet part, such that, most of the pricey operations square measure performed offline once the user doesn’t at once expect the secret writing to be completed, the device is charging or otherwise not in use the web part has very little computations in order that users will get on with their work while not the devices performance being affected in any respect [5]. Information user’s square measure eased from activity pricey decoding operations by outsourcing such operations to a proxy server. The proxy server, employing a reworked decoding key, partlydecryptstheciphertext.However, the partial decoding method doesn’t reveal any info to the malicious proxy server. Then, the info user has to perform solelyanumberofstraightforwardoperations to derive the ultimate plaintext from the partly decrypted cipher text. Similarly, revocation keys are generated offline, with a number of computations within the on-line part for key transformation before they’re given to the proxy server [1], [2].
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6196 2. Existing Methodology 2.1 Improving Privacy and Security in Multi- Authority Attribute- Based Encryption Attribute based encryption (ABE) determines coding ability supported a user’s attributes in a very multi- authority ABE scheme, multiple attribute authorities monitor totally different sets of attributes and issue corresponding decryption keys to users, and encryptions will require that a user acquire keys for applicableattributes from every authority before decrypting a message [1]. 2.2 Identity Based and Attribute Based Cryptography: A Survey Changing scenario of cryptography has led to a modification in paradigm of from certificate primarilybased public keys and key rings to user- dependent keys that are based on identities of users or their attributes. This is often termed as identity based mostly cryptography or attribute based cryptography [2]. 2.3 A Survey of Attribute-basedAccessControlwith User Revocation in Cloud Data Storage. Cipher text-policy attribute-based encryption may be a promising cryptologic resolution in cloud environment, which might be concerned for access management by the information owner to dene access policy [3]. Sadly, an outsourced architecture applied with the attribute-based encryption introduces several challenges during which one among the challenges is revocation [8]. The problem may be a threat to information security within the information owner. Fig. 1 The cloud storage architecture of attribute-based access control 2.4 Attribute-based data access control in mobile cloud computing: Taxonomy and open issues ABE strategies and categorizes them into 3 main categories, like centralized, decentralized, and hierarchic, supported their architectures. We tend to conjointly analysed the various ABE techniques to determine the benefits and drawbacks, the importance and needs, and identifies the analysis gaps [4]. 3. Scope Our system can be used on daily basis instead of encrypting each part of a log with the keys of all recipients; it is possible to encrypt the log only with attributes which match recipients’ attributes. This primitive can also be used for broadcast encryption in order to decrease the number of keys used. 4. Motivation Access control is a requirement for data stored in untrusted servers like clouds. Often encryption and decryption are quite expensive and not practical when users access data from resource. Above mention problem exist in cloud computing so idea of Decentralized Attribute Based Access Control for cloud came in existence. 5. Disadvantages of Existing System 1. Single trusted party who storedata andmonitorsall attributes. 2. We initial review some important Identity based encryption, signature and encryption schemes. 3. The problem may be a threat to information security within the information owner. 4. Taxonomyofattribute-basedapproachessupported important parameters, like access management mode, design, revocation mode, revocation technique, revocation issue, and revocation controller. 6. Proposed System We propose a decentralized attribute primarily based encryption (ABE) theme with quick secret writing, outsourced cryptography and user revocation. Our theme is incredibly specific to the context ofmobilecloudbecausethe storage of encrypted information and also the partial decryption of cipher texts square measure smitten by the cloud and users with mobile devices will transfer information to the cloud or access information from it by acquisition little or no value for secret writing and cryptography respectively the most plan is to divide the secret writing into 2 phases, offline pre-processing section that is finished once the device is otherwisenotinuseand an internet section once the information is really encrypted with the policy. This makes secret writing quicker and a lot of efficient than existing decentralized ABE schemes. For cryptography outsourcing,informationusersgottogenerate a remodeled version of the cryptography key permitting associate degree untrusted proxy server to partly decrypt
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6197 the cipher text while not gaining any info regarding the plaintext. Information users will then absolutely rewrite the partly decrypted cipher text while not performing arts any pricey pairing operations.Wealsointroduceuserrevocationduring this theme while not acquisition too much extra valuewithin the on-line section. Comparison with other ABE themes shows that our scheme considerably reduces computation times for each information homeowners and information users and extremely suitable to be used in mobile devices. 7. Advantages of Proposed system 1. Single trusted party who storedata andmonitorsall attributes and issues all decryption keys. 2. Attribute based cryptography and encryption. 3. Data owner only can modify access policy. 4. Fast encryption, outsourced decryption and user revocation. 8. Modules 8.1 Data Owner Data owner should be free to upload their files to the concern attribute. The system must identify each file with an automatically generated file Id, for future reference. System generates secret code and sent to data owner email and that secret code is required to upload file. Data owner should be allowed to check the status of their file, by using the unique file Id provided by the system. The system must display the file along with the details to the data owner,after uploading the file. 8.2 Data User The data user should be able to see the uploaded files, which are uploaded by the data owner to specified attribute data user only. Data user can download files by sending key request if attribute authority send key to data user then and then data user can download files. Data user can check there key request status. A password protection with secure mode option is provided to guard from unauthorized access to database. 8.3 Attribute Authority Attribute Authority can send response to key request coming from data user to download file. Attribute authority is mainly working on key management. 8.4 Proxy Server Proxy server is a server who can encrypt and decrypt files. AES Asymmetric Encryption Standards is used for encryption and decryption. 8.4 Admin Admin is a super user who has access of everything. Admin can manage users of the system. 9. System design Software design sits at the technical kernel of the software engineering process and is applied regardless of the development paradigm and area is the first step in the development phase for any engineered product or system. The designer’s goal is to produce a model or representation of an entity that will later be built. Beginning, once system requirement have been specified and analyzed, designisthe first of the three technical activities - design, code and test that is required to build and verify software. Fig -2: Proposed System design 10. CONCLUSIONS Encryption mechanisms based on user identities and attributes hold a great promiseforchangingscenariosof computing, namely cloud computing and ubiquitous computing. These schemes relate a key with a set of attributes and thus alleviate the problem of key generation and distribution of PKI. Also, the concepts of such schemes can be used to further design trust and security y mechanisms for data storage in cloud. In this paper we build a CPABE scheme in prime order. As pointed out by the proof of the scheme is in the generic group model using random oracles. The reason for using prime order groups is that the schemes are efficient
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6198 with faster group operations. Our construction can be used to design a scheme in Composite order group, which though inefficient, rests on stronger notions of security in the dual system encryption model. REFERENCES [1] N. Attrapadung and H. Imai. Attribute-based encryption supporting direct/indirect revocation modes. In Cryptography and Coding, pages 278– 300. Springer, 2009. [2] N. Attrapadung and H. Imai. Conjunctive broadcast and attribute-based encryption. In Pairing-Based Cryptography-Pairing 2009: Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings, volume 5671,page248.SpringerScience& Business Media, 2009. [3] N. Balani and S. Ruj. Temporal access control with user revocation for cloud data. In 13th IEEE International Conference on Trust, Security and PrivacyinComputing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014, pages 336–343, 2014. [4] A. Beimel. Secure schemes for secret sharing and key distribution. Ph.D. Thesis, Israel Institute of Technolgy, Technion, Haifa, Israel, 1996. [5] J. Bethencourt, A. Sahai, and B.Waters.Ciphertext-policy attribute-based encryption.In2007IEEESymposiumon Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pages 321–334. IEEE Computer Society, 2007. [6] A. Boldyreva, V. Goyal, and V. Kumar. Identity-based encryption with efficient revocation. In Proceedings of the 15th ACM conference on Computer and communications security, pages 417–426. ACM, 2008. [7] R. Canetti, H. Krawczyk, and J. B. Nielsen. Relaxing chosen-ciphertext security. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, volume 2729 of Lecture Notes in Computer Science, pages 565–582. Springer, 2003. [8] M. Chase. Multi-authority attribute based encryption.In Proceedings of Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007 [8], pages515– 534. [9] M. Chase and S. S. M. Chow. Improving privacy and security in multi-authority attribute-based encryption. In Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009 [9], pages 121–130.