Several Data Security Methodology has been noticed, with recent adoption and spreading of data sharing. One of the most interesting and definitive approach is Cipher text-Policy Attribute-Based Encryption (CP-ABE).CP-ABE provides us with the indulgement of the access policies and its updates. It is used to set or control outsourcing of data sharing; it deals with the issues in CP-ABE. This solution allows encryptor to deals with the access control with respect to the access formula. The lacking of reliability factor lead to weaken the system, therefore we will amplify CB-ABE by introducing some factor. Key Generation center (KGC) and data storing center are the highlighted factors. KGC deals with the drawback of Key escrow problem. As KGC can decrypt the users data as per KGC`s concerns, causing threat to the data sharing Systems. This is not favorable for the distributed scheme where KGC is not trustworthy. Along with the key escrow problem, we will be concerning with the problem of key-revocation that is degradation because of windows of vulnerability. These issues are solved by exploiting the features characteristics of Architecture. The problem of key-escrow is resolved using 2-pc protocol. And Key-revocation is proceeding by using proxy encryption.
Access Control and Revocation for Digital Assets on Cloud with Consideration ...IJERA Editor
In cloud computing applications, users’ data and applications are hosted by cloud providers. With internet and cloud availability increasing numbers of people are storing their content on cloud. Also with presence of social networking, contents stored on cloud are also shared. This requires more security for the contents on cloud. Traditional security solution address only encryption, decryption of data on cloud and its access control , but with this new trend of sharing, the scope of security becomes even higher. In this paper we propose a solution of integrated access control for contents shared on cloud and its efficient revocation.
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Cloud computing is an emerging computing technology that enables users to distantly store their data into a cloud so as to enjoy scalable services when required. And user can outsource their resources to server (also called cloud) using Internet. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Attribute-based encryption (ABE) can be used for log encryption. This survey is more specific to the different security issues on data access in cloud environment.
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating their private keys. Data owner wants the data to be delivered only to specified user and not to unauthorized person that is the data owner makes their private data accessible only to authorized person. We propose attribute based encryption and escrow problem which means written agreement delivered to a third party to overcome this problem. Attribute based Encryption (ABE) is a type of public-key encryption in which the private key of a user and the cipher text are dependent upon attributes. It is a promising cryptographic approach.
Data get to control is a powerful method to guarantee the data security in the cloud. Because of information
out sourcing and un confided in cloud servers, the information get to control turns into a testing issue in cloud
storage systems. Cipher text-Policy Attribute Based Encryption (CP-ABE) is viewed as a standout amongst
the most reasonable advancements for information get to control in distributed storage, since it gives
straightforward control access to the owners. It is hard to implement the existing CP-ABE schemes to access
the information from cloud storage systems. we propose a plan to structure the information securing control in
a revocable multi-expert CP-ABE conspire from cloud storage system
Access Control and Revocation for Digital Assets on Cloud with Consideration ...IJERA Editor
In cloud computing applications, users’ data and applications are hosted by cloud providers. With internet and cloud availability increasing numbers of people are storing their content on cloud. Also with presence of social networking, contents stored on cloud are also shared. This requires more security for the contents on cloud. Traditional security solution address only encryption, decryption of data on cloud and its access control , but with this new trend of sharing, the scope of security becomes even higher. In this paper we propose a solution of integrated access control for contents shared on cloud and its efficient revocation.
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Cloud computing is an emerging computing technology that enables users to distantly store their data into a cloud so as to enjoy scalable services when required. And user can outsource their resources to server (also called cloud) using Internet. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Attribute-based encryption (ABE) can be used for log encryption. This survey is more specific to the different security issues on data access in cloud environment.
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating their private keys. Data owner wants the data to be delivered only to specified user and not to unauthorized person that is the data owner makes their private data accessible only to authorized person. We propose attribute based encryption and escrow problem which means written agreement delivered to a third party to overcome this problem. Attribute based Encryption (ABE) is a type of public-key encryption in which the private key of a user and the cipher text are dependent upon attributes. It is a promising cryptographic approach.
Data get to control is a powerful method to guarantee the data security in the cloud. Because of information
out sourcing and un confided in cloud servers, the information get to control turns into a testing issue in cloud
storage systems. Cipher text-Policy Attribute Based Encryption (CP-ABE) is viewed as a standout amongst
the most reasonable advancements for information get to control in distributed storage, since it gives
straightforward control access to the owners. It is hard to implement the existing CP-ABE schemes to access
the information from cloud storage systems. we propose a plan to structure the information securing control in
a revocable multi-expert CP-ABE conspire from cloud storage system
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)ElavarasaN GanesaN
Securing the data over a cloud network is always a challenging problem
for the researcher over the past one decade. There exist many conventional
algorithms/techniques which proclaim to ensure secure transmission, storage
and retrieval of data over the cloud platform. All these mechanisms mainly
focus on ensuring privacy preserve for of client / user‟s data. This research
work aims to propose distinctive elliptic curve cryptography. DECC is based
on the algebraic structure of elliptic curves in the finite fields. The DECC is
used for privacy preserving since smaller keys are used when compared to all
the rest of the existing cryptographic algorithms. Performance metrics such as
average relative error, time, anonymization time and information loss are
taken into account. Implementations are carried out in MATLAB tool. Results
portrays that the proposed DECC outperforms the existing methods.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Privacy-Preserving Updates to Anonymous and Confidential Databaseijdmtaiir
The current trend in the application space towards
systems of loosely coupled and dynamically bound
components that enables just-in-time integration jeopardizes
the security of information that is shared between the broker,
the requester, and the provider at runtime. In particular, new
advances in data mining and knowledge discovery that allow
for the extraction of hidden knowledge in an enormous amount
of data impose new threats on the seamless integration of
information. We consider the problem of building privacy
preserving algorithms for one category of data mining
techniques, association rule mining.Suppose Alice owns a kanonymous database and needs to determine whether her
database, when inserted with a tuple owned by Bob, is still kanonymous. Also, suppose that access to the database is strictly
controlled, because for example data are used for certain
experiments that need to be maintained confidential. Clearly,
allowing Alice to directly read the contents of the tuple breaks
the privacy of Bob (e.g., a patient’s medical record); on the
other hand, the confidentiality of the database managed by
Alice is violated once Bob has access to the contents of the
database. Thus, the problem is to check whether the database
inserted with the tuple is still k-anonymous, without letting
Alice and Bob know the contents of the tuple and the database,
respectively. In this paper, we propose two protocols solving
this problem on suppression-based and generalization-based kanonymous and confidential databases. The protocols rely on
well-known cryptographic assumptions, and we provide
theoretical analyses to proof their soundness and experimental
results to illustrate their efficiency.We have presented two
secure protocols for privately checking whether a kanonymous database retains its anonymity once a new tuple is
being inserted to it. Since the proposed protocols ensure the
updated database remains K-anonymous, the results returned
from a user’s (or a medical researcher’s) query are also kanonymous. Thus, the patient or the data provider’s privacy
cannot be violated from any query. As long as the database is
updated properly using the proposed protocols, the user queries
under our application domain are always privacy-preserving
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
Application of CP-ABE Scheme in Data Sharing System for confidentialityEditor IJMTER
CP-ABE Scheme (Cipher text policy attribute-based encryption) can become the
promising cryptographic solution in distributed systems such as social network s and cloud
computing. The trending development of network and computing technology enables the user to
share their data through the online social networks such as Facebook, or uploading the personal data
on Google Vault. The people are using the advantages of new technologies but they are also concern
about their personal data security. The current issue with data sharing systems is the enforcement of
access policies. CP-ABE scheme enables the encryptor to define attribute set over a universe of
attributes that a decryptor needs to decrypt the cipher text, thus each user with a different set of
attributes is allowed to different pieces of data as per the security policy.
In this paper, we consider ‘secure attribute based system with short ciphertext’ is a tool for implementing fine-grained access control over encrypted data, and is conceptually similar to traditional access control methods such as Role-Based Access Control. However, current ‘secure attribute based system with short ciphertext’ schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. We propose a novel ‘secure attribute based system with short ciphertext’ scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits.
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)ElavarasaN GanesaN
Securing the data over a cloud network is always a challenging problem
for the researcher over the past one decade. There exist many conventional
algorithms/techniques which proclaim to ensure secure transmission, storage
and retrieval of data over the cloud platform. All these mechanisms mainly
focus on ensuring privacy preserve for of client / user‟s data. This research
work aims to propose distinctive elliptic curve cryptography. DECC is based
on the algebraic structure of elliptic curves in the finite fields. The DECC is
used for privacy preserving since smaller keys are used when compared to all
the rest of the existing cryptographic algorithms. Performance metrics such as
average relative error, time, anonymization time and information loss are
taken into account. Implementations are carried out in MATLAB tool. Results
portrays that the proposed DECC outperforms the existing methods.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Privacy-Preserving Updates to Anonymous and Confidential Databaseijdmtaiir
The current trend in the application space towards
systems of loosely coupled and dynamically bound
components that enables just-in-time integration jeopardizes
the security of information that is shared between the broker,
the requester, and the provider at runtime. In particular, new
advances in data mining and knowledge discovery that allow
for the extraction of hidden knowledge in an enormous amount
of data impose new threats on the seamless integration of
information. We consider the problem of building privacy
preserving algorithms for one category of data mining
techniques, association rule mining.Suppose Alice owns a kanonymous database and needs to determine whether her
database, when inserted with a tuple owned by Bob, is still kanonymous. Also, suppose that access to the database is strictly
controlled, because for example data are used for certain
experiments that need to be maintained confidential. Clearly,
allowing Alice to directly read the contents of the tuple breaks
the privacy of Bob (e.g., a patient’s medical record); on the
other hand, the confidentiality of the database managed by
Alice is violated once Bob has access to the contents of the
database. Thus, the problem is to check whether the database
inserted with the tuple is still k-anonymous, without letting
Alice and Bob know the contents of the tuple and the database,
respectively. In this paper, we propose two protocols solving
this problem on suppression-based and generalization-based kanonymous and confidential databases. The protocols rely on
well-known cryptographic assumptions, and we provide
theoretical analyses to proof their soundness and experimental
results to illustrate their efficiency.We have presented two
secure protocols for privately checking whether a kanonymous database retains its anonymity once a new tuple is
being inserted to it. Since the proposed protocols ensure the
updated database remains K-anonymous, the results returned
from a user’s (or a medical researcher’s) query are also kanonymous. Thus, the patient or the data provider’s privacy
cannot be violated from any query. As long as the database is
updated properly using the proposed protocols, the user queries
under our application domain are always privacy-preserving
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
Application of CP-ABE Scheme in Data Sharing System for confidentialityEditor IJMTER
CP-ABE Scheme (Cipher text policy attribute-based encryption) can become the
promising cryptographic solution in distributed systems such as social network s and cloud
computing. The trending development of network and computing technology enables the user to
share their data through the online social networks such as Facebook, or uploading the personal data
on Google Vault. The people are using the advantages of new technologies but they are also concern
about their personal data security. The current issue with data sharing systems is the enforcement of
access policies. CP-ABE scheme enables the encryptor to define attribute set over a universe of
attributes that a decryptor needs to decrypt the cipher text, thus each user with a different set of
attributes is allowed to different pieces of data as per the security policy.
In this paper, we consider ‘secure attribute based system with short ciphertext’ is a tool for implementing fine-grained access control over encrypted data, and is conceptually similar to traditional access control methods such as Role-Based Access Control. However, current ‘secure attribute based system with short ciphertext’ schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. We propose a novel ‘secure attribute based system with short ciphertext’ scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits.
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...Nexgen Technology
NEXGEN TECHNOLOGY is an Software Research and Development Company headquartered at Pondicherry, India, posses a strong support system, a well equipped, state-of-the-art development center and a dedicated team of professionals.
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Maregowda R Byalachinta
In the cloud, for achieving access control and keeping data confidential, the data owners could adopt attribute-based encryption to encrypt the stored data. Users with limited computing power are however more likely to delegate the mask of the decryption task to the cloud servers to reduce the computing cost. As a result, attribute-based encryption with delegation emerges. Still, there are caveats and questions remaining in the previous relevant works. For instance, during the delegation, the cloud servers could tamper or replace the delegated ciphertext and respond a forged computing result with malicious intent. They may also cheat the eligible users by responding them that they are ineligible for the purpose of cost saving. Furthermore, during the encryption, the access policies may not be flexible enough as well. Since policy for general circuits enables to achieve the strongest form of access control, a construction for realizing circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation has been considered in our work. In such a system, combined with verifiable computation and encrypt-then-mac mechanism, the data confidentiality, the fine-grained access control and the correctness of the delegated computing results are well guaranteed at the same time. Besides, our scheme achieves security against chosen-plaintext attacks under the k-multilinear Decisional Diffie-Hellman assumption. Moreover, an extensive simulation campaign confirms the feasibility and efficiency of the proposed solution.
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...Pawan Arya
To design and implement a multi authority fully anonymous Attribute Based Encryption control scheme to address the data privacy and user identity privacy problems in cloud computing environment .
A Secure & Scalable Access Method in Cloud Computingijsrd.com
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack, The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility. We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments.
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
Cloud Computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge
and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud
computing the most important matter of concern are data security and privacy along with flexibility, scalability and fine grained access
control of data being the other requirements to be maintained by cloud systems Access control is one of the prominent research topics
and hence various schemes have been proposed and implemented. But most of them do not provide flexibility, scalability and fine
grained access control of the data on the cloud. In order to address the issues of flexibility, scalability and fine grained access control
of remotely stored data on cloud we have proposed the hierarchical attribute set-based encryption (HASBE) which is the extension of
attribute- set-based encryption(ASBE) with a hierarchical structure of users. The proposed scheme achieves scalability by handling the
authority to appropriate entity in the hierarchical structure, inherits flexibility by allowing easy transfer and access to the data in case
of location switch. It provides fine grained access control of data by showing only the requested and authorized details to the user thus
improving the performance of the system. In addition, it provides efficient user revocation within expiration time, request to view
extra-attributes and privacy in the intra-level hierarchy is achieved. Thus the scheme is implemented to show that is efficient in access
control of data as well as security of data stored on cloud with comprehensive experiments
TO GET THIS PROJECT COMPLETE SOURCE CODE PLEASE CALL BEOLOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM ,EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
TO GET THIS PROJECT COMPLETE SOURCE CODE PLEASE CALL BEOLOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM ,EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
Improved ciphertext-policy time using short elliptic curve Diffie–HellmanIJECEIAES
Ciphertext-policy attribute-based encryption (CP-ABE) is a suitable solution for the protection of data privacy and security in cloud storage services. In a CP-ABE scheme which provides an access structure with a set of attributes, users can decrypt messages only if they receive a key with the desired attributes. As the number of attributes increases, the security measures are strengthened proportionately, and they can be applied to longer messages as well. The decryption of these ciphertexts also requires a large decryption key which may increase the decryption time. In this paper, we proposed a new method for improving the access time to the CP using a new elliptic curve that enables a short key size to be distributed to the users that allows them to use the defined attributes for encryption and decryption. Each user has a specially created key which uses the defined attributes for encryption and decryption based on the Diffie-Hellman method. After the implement, the results show that this system saves nearly half of the execution time for encryption and decryption compared to previous methods. This proposed system provides guaranteed security by means of the elliptic curve discrete logarithmic problem.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
In cloud computing outsourcing group resource among cloud users is a major challenge, so cloud computing provides a low-cost and well-organized solution. Due to frequent change of membership, sharing data in a multi-owner manner to an untrusted cloud is still its challenging issue. In this paper we proposed a secure multi-owner data sharing scheme for dynamic group in public cloud. By providing AES encryption with convergent key while uploading the data, any cloud user can securely share data with others. Meanwhile, the storage overhead and encryption computation cost of the scheme are independent with the number of revoked users. In addition, I analyze the security of this scheme with rigorous proofs. One-Time Password is one of the easiest and most popular forms of authentication that can be used for securing access to accounts. One-Time Passwords are often referred to as secure and stronger forms of authentication in multi-owner manner. Extensive security and performance analysis shows that our proposed scheme is highly efficient and satisfies the security requirements for public cloud based secure group sharing.
Mobile nodes in military environments like a field of battle or a hostile region ar seemingly to suffer from intermittent network property and frequent partitions. Disruption-tolerant network (DTN) technologieshave become eminent solutions that enable wireless devices carried by troopers to speak with one another and access the guidance or command faithfully by exploiting secondary storage nodes.a number of the foremost difficult problems during this state of affairs ar the social control of authorization policiesand also the policies update for secure information retrieval. Ciphertext- policy attribute-based secret writing (CP-ABE) could be a promising cryptologic resolution to the access management problems. However, the matter of applying CP-ABE in suburbanised DTNs introduces many security and privacy challenges with respect to the issued fromtotally different authorities. during this paper, we have a tendencyto propose se- cure information retrieval theme victimization CP-ABE for suburbanised DTNs wherever multiple key authorities manage their attributes severally. we have a tendency to demonstrate a way to apply the projected mechanism and with efficiency manage confidential information distributed within the disruption-tolerant military network.
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...IJERA Editor
Enterprise level cloud data storage is gaining importance in the area of consumer level file hostage services. Cloud storage providers are responsible for availability, accessibility and protection of the user data. A number of encrypting schemes have been proposed for encrypting the user data in cloud storage to protect unauthorized access. Most of the Attribute Based Encryption (ABE) schemes that were proposed assume that the data in cloud storage are secure and are never disclosed. However, in reality, some of the authorities may force the cloud storage providers to disclose the cloud user’s secrets or personal data. In this paper, a new deniable ABE encryption scheme for cloud storage is proposed to ensure user privacy with minimized unauthorized access. A new ranking algorithm assigns a rank to each user at the time of registration based on their personal information. The rank of the user enhances the privacy and provides access control to the data stored on cloud. Each file uploaded to cloud is assigned with a rank and the file downloads only if the rank of the user matches the rank associated with the file. If rank of the user does not match then a fake file will be downloaded. Since authorities who demand for user secret cannot decide if the information they get about the user are legitimate, the cloud storage providers make sure that the individual user privacy is still protected. The ranking algorithm is also used to provide improved cloud access response time to prioritized users
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Abstract-The current trend in the application space towards systems of loosely coupled and dynamically bound components that enables just-in-time integration jeopardizes the security of information that is shared between the broker, the requester, and the provider at runtime. In particular, new advances in data mining and knowledge discovery that allow for the extraction of hidden knowledge in an enormous amount of data impose new threats on the seamless integration of information. We consider the problem of building privacy preserving algorithms for one category of data mining techniques, association rule mining.Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential. Clearly, allowing Alice to directly read the contents of the tuple breaks the privacy of Bob (e.g., a patient’s medical record); on the other hand, the confidentiality of the database managed by Alice is violated once Bob has access to the contents of the database. Thus, the problem is to check whether the database inserted with the tuple is still k-anonymous, without letting Alice and Bob know the contents of the tuple and the database, respectively. In this paper, we propose two protocols solving this problem on suppression-based and generalization-based k-anonymous and confidential databases. The protocols rely on well-known cryptographic assumptions, and we provide theoretical analyses to proof their soundness and experimental results to illustrate their efficiency.We have presented two secure protocols for privately checking whether a k-anonymous database retains its anonymity once a new tuple is being inserted to it. Since the proposed protocols ensure the updated database remains K-anonymous, the results returned from a user’s (or a medical researcher’s) query are also k-anonymous. Thus, the patient or the data provider’s privacy cannot be violated from any query. As long as the database is updated properly using the proposed protocols, the user queries under our application domain are always privacy-preserving.
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
Attribute-based encryption (ABE) can be used for the encryption of data with attributes and logs. Instead of encrypting each part of a log with the keys of all recipients, it is possible to encrypt the log only with attributes which match recipient’s attributes. This primitive can also be used for broadcast encryption in order to decrease the number of keys used. Here the access control will be given with the keys and the attributes. The outsourcing computation cost will be comparatively less when compared to the existing system. The data will be shared between the two users if and only if the key matches. In addition, for the first time, we propose an outsourced ABE construction which provides check ability of the outsourced computation results in an efficient way. The performance analysis has been proven this method to be more secured.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
Similar to CP-ABE Scheme with extended reliability factor and load balancing in distributed n/w (20)
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
CP-ABE Scheme with extended reliability factor and load balancing in distributed n/w
1. International Journal of Engineering Inventions
e-ISSN: 2278-7461, p-ISSN: 2319-6491
Volume 4, Issue 1 (July 2014) PP: 06-10
www.ijeijournal.com Page | 6
CP-ABE Scheme with extended reliability factor and load
balancing in distributed n/w
Miss. Snehlata V. Gadge1
, Dr. S. T. Singh2
1
Research Scholar, Department of Computer Science, Pune, India
2
Professors, Department of Computer Science, Pune, India
Abstract: Several Data Security Methodology has been noticed, with recent adoption and spreading of data
sharing. One of the most interesting and definitive approach is Cipher text-Policy Attribute-Based Encryption
(CP-ABE).CP-ABE provides us with the indulgement of the access policies and its updates. It is used to set or
control outsourcing of data sharing; it deals with the issues in CP-ABE. This solution allows encryptor to deals
with the access control with respect to the access formula. The lacking of reliability factor lead to weaken the
system, therefore we will amplify CB-ABE by introducing some factor. Key Generation center (KGC) and data
storing center are the highlighted factors. KGC deals with the drawback of Key escrow problem. As KGC can
decrypt the users data as per KGC`s concerns, causing threat to the data sharing Systems. This is not favorable
for the distributed scheme where KGC is not trustworthy. Along with the key escrow problem, we will be
concerning with the problem of key-revocation that is degradation because of windows of vulnerability. These
issues are solved by exploiting the features characteristics of Architecture. The problem of key-escrow is
resolved using 2-pc protocol. And Key-revocation is proceeding by using proxy encryption.
Keyword: Distributed System, fair scheduling, Attribute, 2 pc, Access structure
I. Introduction
In the recent days the networking and computing environments need safe and flexible pace to cope
with the data sharing services in order to utilize time along the resources. Concerning to the matter of
technology .People now days can smoothly share their data, exchange their talks online. People can easily
contribute their happiness and express feelings towards each other by uploading their personal belonging like
private data, chats or snaps by uploading onto the social networking site such as face book or LinkedIn. Apart
from that they can upload their sensitive health records into data servers like Google Health or other private
servers for cost saving. Along with the bashing effects of the internet, the need of high security also arises with
proper setup and access controlling functionality. Incorrect use of the personal data by any storage server or
unauthorized access by outsider can be threat to security model making misuse of data in a wrong way.
Attribute based encryption technique determines decryption`s capability on bases of uses attributes.
This introduce us with the new public key primitive knows as Attribute based Encryption.ABE gives authority
to user in such a way that encryptor to define set of attribute over a whole place of attribute that a decryptor
should possess in order to decrypt the cipher text. User`s secret key is based on a set user`s credentials, and
cipher is generated based on the policy generated. Forward approach in which data sharing should be stored,
encrypted data before uploading to protect privacy were introduced in traditional public key infrastructure, data
encryption process can be adopted, and the owner of data prior to uploading the data to encrypt data uses the
public key users; If a user sends through the access request to the sharing, the sharing will return to the same
cipher text data user a user to decrypt the data using private key. But this matter would lead to some problems:
(1) to be able to encrypt data, the data owner needs to obtain the data user's public key to complete this; (2) a lot
of storage overhead would spend because of the same plaintext with different public keys.
In order to overcome these limitations Attribute based encryption came into existence.ABE first
identify user`s properties. ABE has advantage over traditional PKC ,as it favors‟ with one too many encryption
instead of one to one.ABE as a set of attribute, is used to encryption and decryption of data.ABE comes in two
flavors, 1) Cipher text-policy ABE 2) Key-policy ABE. In cipher text, attribute are mentioned to describe user`s
credentials, encryptor determines policy whether who can decrypt data.CPABE is more promising concept for
data sharing System as it allows to set access policy decisions in the data owner`s hand means secret key is
associated with a set of attributes, while in key-policy, reverse is the process, attributes are used to notify
encrypted data, and policy are built in user`s key. Sometimes it is not suitable in certain applications, as the
owner of data has to trust the key issue; apart access structure is KP-ABE is a monotonic access structure.
Negative attribute can`t be expressed, for excluding the entity with whom owner don`t want to share data. CP-
ABE plans to address problem of KP-ABE that trust only key-issuer data.
Recently with new, safe, and effective methods that features-based method of data sharing System by
exploiting a fine-grained data access control to implement sharing or distribution of data. Practically the better
efficiency ,scalability and security ,overcoming the limitations of exiting methods shows the methods of its
2. CP-ABE Scheme with extended reliability factor and load balancing in distributed network.
www.ijeijournal.com Page | 7
credibility as it handles many requests to single user key generator system. Thus to achieve reliability, aiming to
improve security, load balancing with increasing efficiency. In the further section II, we will be connecting with
literature survey over various methods in data distributed system. In section III the proposed approach with its
block diagram is depicted. In IV we will be dealing with the current state along with experimental setup and
results. Finally conclusion and future work is predicted in section V.
II. Literature Survey
This section will be detailed with the different methods those are presented to solve the trust security
issue and access policy controls in data sharing environment along reliability services.
Sahai and B. Waters [5] introduced the concept of Fuzzy Identity Based Encryption, which allows for
error tolerance between the identity of a private key and the public key used to encrypt a cipher text. They
described two practical applications of Fuzzy IBE of encryption using biometrics and attribute-based
encryption. They presented our construction of a Fuzzy IBE scheme that uses set overlap as the distance
metric between identities. Finally, they proved our scheme under the Selective ID model by reducing it to
an assumption that can be viewed as a modified version of the Bilinear Decisional Diffie Hellman
assumption. As more sensitive data is shared and stored by third-party sites on the Internet, There is on
these sites will need to encrypt data stored. Encrypt data to a drawback is that it selectively only a coarse-
grained level can be shared (i.e., give your private key to another party). Features of working in our
cryptosystem texts are labeled with sets and private keys which are able to decrypt cipher strength texts
users are associated with access control structures.
L. Ebrahimi, S. Nikova, M. Petkovic, P. Hartel, and W. Jonker [4] presented a mediated Cipher text-
Policy Attribute-Based Encryption (CP-ABE) which is the extension of CPABE with attribute revocation.
And demonstrate how to apply the mCP-ABE scheme to securely manage Personal Health Records.
Chow [20] proposed an anonymous private key generation protocol in identity-based literature such that
the KGC can issue a private key to an authenticated user without knowing the list of users‟ identities. It
seems that this anonymous private key generation protocol works properly in ABE systems when we treat
an attribute as an identity in this construction.
Junbeom Hur [1] specified the cause cases of corruption of KGC and corrupted data storing center, He
has provided with a proof of 2pc protocol. And presented new efficient and secured method for data
sharing systems. But the limitation of this system was reliability and load balancing under real time
environment.
III. PROPOSED APPROACH FRAMEWORK AND DESIGN
4.1 Problem Definition
The literature review presenting many methods for secure data sharing. In [1] we studied the approach
which is presented for improving the security and efficiency in attribute-based data sharing. This method
significantly overcomes the drawbacks of previous methods such as key escrow problem and scalability,
processing speed. Following figure 1 shows the architecture of this method. However we have identified some
problems in this system such as load balancing, reliability of system. In the existing system, the major role is
played by key generation system. If the number of requests or communication is more, then load on key
generation system becomes more and hence this resulted into slow response and cryptographic operations,
therefore loads needs to be balanced. Another problem is, if the key generation system fails, or downs
temporarily then whole security system downs. Hence needs to improve the reliability to this system.
Figure 1: Architecture of Security Method presented in [1].
3. CP-ABE Scheme with extended reliability factor and load balancing in distributed network.
www.ijeijournal.com Page | 8
4.2 Access Structure
Figure 2: Example of Access Structure (Access policy)
Let T be a tree representing an access structure. Each non-leaf node of the tree represents a threshold
gate, described by its children and a threshold value. . To facilitate working with the access trees, we define a
few functions. We denote the parent of the node x in the tree by parent(x). The function att(x) is defined only if
x is a leaf node and denotes the attribute associated with the leaf node x in the tree. The access tree T also
defines an ordering between the children of every node, that is, the children of a node are numbered from 1 to
num. The function index(x) returns such a number associated with the node x. Where the index values are
uniquely assigned to nodes in the access structure for a given key in an arbitrary manner.
4.3 Scope and Objectives
Main aim is to improve security with respect to distributed System, using third party protocol. By using
load balancing technique we are providing reliability to system
- To maintain data integrity, confidentiality as well consistency etc.
- Third party will work like as web service so it‟s an assurance for security to client data which will store
on server.
- The factor of reliability is improved by using load balancing technique
- To present the analysis of existing and proposed algorithms in order to claim the efficiency.
4.4 Proposed System Architecture
In this paper we are extending the method presented in [1] with aim of achieving the reliability,
scalability, load balancing etc. The solution to overcome the limitations of existing method is to add the new
backup key generation system which is having the same functionality which is presented in [1]. This increases
the system extra resource as well as cost, but it‟s always better to have reliable, efficient and load balanced
security system in place. Following figure 2 is showing the proposed system architecture. As showing in figure
2, there are two key generation center [1 and 2]. Rest all security algorithms and processes are same as given in
[1]. Here we added following two functionalities for key generation for load balancing and reliability.
Figure 3: Proposed Architecture
4. CP-ABE Scheme with extended reliability factor and load balancing in distributed network.
www.ijeijournal.com Page | 9
4.5 Algorithms
4.4.1 Two PC Protocol
KGC with Data storing centre are involved in 2-PC protocol. The user needs to get connected with both
the parties before getting the set of keys. The work of KGC is to authenticate users, along with the distribution
of the set of attribute keys. The generation of secure 2-pc protocol takes places via. KGC and Data Storing
Centre. It does the work of issuing the key components to user. So that user is able to generate secret key by
combining the key components received from the both authorities. Thus in order to overcome the problem of
key-escrow, 2-pc is introduced.
1. Init←setup (1ʎ
), works as trusted initialize and gives public key as output.
2. KGC generates public key and private key (PKk,MKk) ←KKGC()
3. Same as KGC generates the keys,Data Storing Center also generates the key,publiv and private
key(PKk,MKk) ←KDSC()
4. KeycommD (MKD,IDt)↔ Keycommk(MKk,IDt,aux)
5. SKK,ut←IssueKeyK(aux,s)
6. SKu,ut←IssueKeyD()
4.4.2Dynamic Load Balancing using fair scheduling algorithm
1. Create set of Queues.
{Queues statues is to be checked}
2. For each queue q1 in Q
3. While there are tasks in the queue do,
4. Assign demand rate of task,Xi
5. K=C/N
6. Xi<k
7. Assign Xi to ith task as fair rate (threshold)
Else
8. Assign to ith task as fair rate.
9. Calculate fair completion time ti(x) that is time slice
End while
End loop
10. While (Load of any processor is greater than average load processor) do
Selected for migration to other division
End While
11. Calculation of turnaround time, initial time, time taken .etc
VI. Results of Practical Work
Following figure shows the practical work done. Figure 3 shows expected Performance graph. As
shown in figure Number of user increases and this causing transferring of request to KGC2, improves the
response time and efficient results as directed in the graph.
Figure 4 Performance graph
VI. Conclusion and Future Work
We have presented the system which is based on efficient security method. The existing scheme was
based on attribute based data sharing security. New technique has been introduced by using the security
approach along with that we are merging the load balancing technique, which cause faster response in case
5. CP-ABE Scheme with extended reliability factor and load balancing in distributed network.
www.ijeijournal.com Page | 10
primary source gets down or get overloaded. This results in decreasing the response time from 3rd
party. The
results presented are showing our current state of work over proposed approach. For future work we will first
complete the practical analysis of proposed work and next will be try to enforce these policies on the multimedia
files. As well improve the proposed results and security.
Acknowledgements
I am highly grateful to Prof. S. T. Singh, for his sincere advice and guidance in my work. I warmly
express and acknowledge my special thanks.
REFERENCES
[1] Junbeom Hur, “Improving Security and Efficiency in Attribute-Based Data Sharing”, IEEE TRANSACTIONS ON KNOWLEDGE
AND DATA ENGINEERING, VOL. 25, NO. 10, OCTOBER 2013.
[2] D.Khader,” Attribute Based Authentication Schemes,” PhD Dissertation University of Bath, 2009.
[3] M. S. Hwang and I. C Lin, Introduction to Information and Network Security (4ed, in Chinese)," in Mc Grew Hill. In Taiwan, 2011.
[4] L. Ebrahimi, Q. Tang, P. Hartel, and W. Jonker, Efficient and provable secure cipher text-policy attribute-based encryption
Schemes, "In Proceedings of the In-formation Security Practice and Experience”, pp. 1-12, 2009.
[5] A. Sahai and B. Waters, Fuzzy identity based encryption," Advances in Cryptology”, V EUROCRYPT, vol. 3494 of LNCS, pp.
457-473, 2005.
[6] D. Nali, C. Adams, and A. Miri, Using threshold attribute-based encryption for practical biometric- based access control,"
International Journal of Net-work Security, vol. 1, no. 3, pp. 173-182, 2005.
[7] V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data," in
Proceedings of the 13th
ACM conference on Computer and communications security, pp. 89-98, 2006.
[8] R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with non-monotonic access structures," in Proceedings of the
14th ACM conference on Computer and communications security, pp. 195- 203, 2007.
[9] J. Anderson, “Computer Security Planning Study,” Technical Report 73-51, Air Force Electronic System Division, 1972.
[10] L. Ebrahimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated Cipher text-Policy Attribute-Based Encryption and Its
Application,” Proc. Int‟l Workshop Information Security Applications (WISA ‟09), pp. 309-323, 2009.
[11] Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” Proc. Int‟l Conf. Theory and Applications of Cryptographic Techniques
(Euro crypt ‟05), pp. 457-473, 2005.
[12] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,”
Proc. ACM Conf. Computer and Comm. Security, pp. 89-98, 2006.
[13] J. Bettencourt, A. Sahai, and B. Waters, “Cipher text Policy. Attribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy,
pp. 321-334, 2007.R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-Based Encryption with Non-Monotonic Access Structures,”
Proc. ACM Conf. Computer and Comm. Security, pp. 195-203, 2007.
[14] John Bettencourt, Amit Sahai, Brent Waters-„Cipher text-Policy Attribute-Based Encryption.
[15] M. Chase and S.S.M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” Proc. ACM Conf.
Computer and Comm. Security, pp. 121-130, 2009.
[16] S.S.M. Chow, “Removing Escrow from Identity-Based Encryption,” Proc. Int‟l Conf. Practice and Theory in Public Key
Cryptography (PKC ‟09), pp. 256-276, 2009.