In this paper, we consider ‘secure attribute based system with short ciphertext’ is a tool for implementing fine-grained access control over encrypted data, and is conceptually similar to traditional access control methods such as Role-Based Access Control. However, current ‘secure attribute based system with short ciphertext’ schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. We propose a novel ‘secure attribute based system with short ciphertext’ scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Cloud computing is an emerging computing technology that enables users to distantly store their data into a cloud so as to enjoy scalable services when required. And user can outsource their resources to server (also called cloud) using Internet. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Attribute-based encryption (ABE) can be used for log encryption. This survey is more specific to the different security issues on data access in cloud environment.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Cloud computing is an emerging computing technology that enables users to distantly store their data into a cloud so as to enjoy scalable services when required. And user can outsource their resources to server (also called cloud) using Internet. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Attribute-based encryption (ABE) can be used for log encryption. This survey is more specific to the different security issues on data access in cloud environment.
Attribute Based Encryption with Privacy Preserving In Clouds Swathi Rampur
This is a ppt made by shrihari ,in this encryption with privacy preserving in clouds is described!
It will be helpfull for those who are doing projects on cloud!
Mobile nodes in military environments like a field of battle or a hostile region ar seemingly to suffer from intermittent network property and frequent partitions. Disruption-tolerant network (DTN) technologieshave become eminent solutions that enable wireless devices carried by troopers to speak with one another and access the guidance or command faithfully by exploiting secondary storage nodes.a number of the foremost difficult problems during this state of affairs ar the social control of authorization policiesand also the policies update for secure information retrieval. Ciphertext- policy attribute-based secret writing (CP-ABE) could be a promising cryptologic resolution to the access management problems. However, the matter of applying CP-ABE in suburbanised DTNs introduces many security and privacy challenges with respect to the issued fromtotally different authorities. during this paper, we have a tendencyto propose se- cure information retrieval theme victimization CP-ABE for suburbanised DTNs wherever multiple key authorities manage their attributes severally. we have a tendency to demonstrate a way to apply the projected mechanism and with efficiency manage confidential information distributed within the disruption-tolerant military network.
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation.
Smart Card technology is the emerging technology which is developing among
common masses in our culture and widely used in the sectors of banking and industries.
Many research works are undergoing in this area to provide highly confidential data
transmission. Existing Scheme provides a security against offline attack for the lost Smart
Card using Elliptic Curve Cryptography (ECC) but it requires more communication and
computation overhead with higher key length. To overcome this limitation, DNA based
Password authentication using Hyper Elliptic Curve Cryptography (HECC) scheme is
proposed. It provides more security than existing system which allows server and smartcard
to exchange the generated password and verify each other. This system exploits the
advantages of Hyperelliptic Curve Cryptography (HECC) technique which is having lesser
key size, less communication and computation overhead for Password generation and
signature verification process.
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
Key aggregate searchable encryption (kase) for group data sharing via cloud storage
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
In the military devices there is need to transmission of data security and fast. These proposed technique presents the secure,
efficient and fast way to send images using Identity Based Cryptography and Visual Cryptography. In this application Identity Based
Cryptography is used with Visual cryptography. In Identity based cryptography the RSA Cryptosystem is used to generate public and
private key by using Ancient Indian Mathematics for fast mathematical calculation. RSA is the safest and standard algorithm. Vedic
method is so efficient in multiplication terms of area, speed compered to its modern mathematics implementation. The regeneration of
public/private key is adopted to make the system more secure from various attacks.
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...Nexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Attribute Based Encryption with Privacy Preserving In Clouds Swathi Rampur
This is a ppt made by shrihari ,in this encryption with privacy preserving in clouds is described!
It will be helpfull for those who are doing projects on cloud!
Mobile nodes in military environments like a field of battle or a hostile region ar seemingly to suffer from intermittent network property and frequent partitions. Disruption-tolerant network (DTN) technologieshave become eminent solutions that enable wireless devices carried by troopers to speak with one another and access the guidance or command faithfully by exploiting secondary storage nodes.a number of the foremost difficult problems during this state of affairs ar the social control of authorization policiesand also the policies update for secure information retrieval. Ciphertext- policy attribute-based secret writing (CP-ABE) could be a promising cryptologic resolution to the access management problems. However, the matter of applying CP-ABE in suburbanised DTNs introduces many security and privacy challenges with respect to the issued fromtotally different authorities. during this paper, we have a tendencyto propose se- cure information retrieval theme victimization CP-ABE for suburbanised DTNs wherever multiple key authorities manage their attributes severally. we have a tendency to demonstrate a way to apply the projected mechanism and with efficiency manage confidential information distributed within the disruption-tolerant military network.
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation.
Smart Card technology is the emerging technology which is developing among
common masses in our culture and widely used in the sectors of banking and industries.
Many research works are undergoing in this area to provide highly confidential data
transmission. Existing Scheme provides a security against offline attack for the lost Smart
Card using Elliptic Curve Cryptography (ECC) but it requires more communication and
computation overhead with higher key length. To overcome this limitation, DNA based
Password authentication using Hyper Elliptic Curve Cryptography (HECC) scheme is
proposed. It provides more security than existing system which allows server and smartcard
to exchange the generated password and verify each other. This system exploits the
advantages of Hyperelliptic Curve Cryptography (HECC) technique which is having lesser
key size, less communication and computation overhead for Password generation and
signature verification process.
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
Key aggregate searchable encryption (kase) for group data sharing via cloud storage
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
In the military devices there is need to transmission of data security and fast. These proposed technique presents the secure,
efficient and fast way to send images using Identity Based Cryptography and Visual Cryptography. In this application Identity Based
Cryptography is used with Visual cryptography. In Identity based cryptography the RSA Cryptosystem is used to generate public and
private key by using Ancient Indian Mathematics for fast mathematical calculation. RSA is the safest and standard algorithm. Vedic
method is so efficient in multiplication terms of area, speed compered to its modern mathematics implementation. The regeneration of
public/private key is adopted to make the system more secure from various attacks.
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...Nexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Application of CP-ABE Scheme in Data Sharing System for confidentialityEditor IJMTER
CP-ABE Scheme (Cipher text policy attribute-based encryption) can become the
promising cryptographic solution in distributed systems such as social network s and cloud
computing. The trending development of network and computing technology enables the user to
share their data through the online social networks such as Facebook, or uploading the personal data
on Google Vault. The people are using the advantages of new technologies but they are also concern
about their personal data security. The current issue with data sharing systems is the enforcement of
access policies. CP-ABE scheme enables the encryptor to define attribute set over a universe of
attributes that a decryptor needs to decrypt the cipher text, thus each user with a different set of
attributes is allowed to different pieces of data as per the security policy.
Several Data Security Methodology has been noticed, with recent adoption and spreading of data sharing. One of the most interesting and definitive approach is Cipher text-Policy Attribute-Based Encryption (CP-ABE).CP-ABE provides us with the indulgement of the access policies and its updates. It is used to set or control outsourcing of data sharing; it deals with the issues in CP-ABE. This solution allows encryptor to deals with the access control with respect to the access formula. The lacking of reliability factor lead to weaken the system, therefore we will amplify CB-ABE by introducing some factor. Key Generation center (KGC) and data storing center are the highlighted factors. KGC deals with the drawback of Key escrow problem. As KGC can decrypt the users data as per KGC`s concerns, causing threat to the data sharing Systems. This is not favorable for the distributed scheme where KGC is not trustworthy. Along with the key escrow problem, we will be concerning with the problem of key-revocation that is degradation because of windows of vulnerability. These issues are solved by exploiting the features characteristics of Architecture. The problem of key-escrow is resolved using 2-pc protocol. And Key-revocation is proceeding by using proxy encryption.
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...Nexgen Technology
NEXGEN TECHNOLOGY is an Software Research and Development Company headquartered at Pondicherry, India, posses a strong support system, a well equipped, state-of-the-art development center and a dedicated team of professionals.
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Maregowda R Byalachinta
In the cloud, for achieving access control and keeping data confidential, the data owners could adopt attribute-based encryption to encrypt the stored data. Users with limited computing power are however more likely to delegate the mask of the decryption task to the cloud servers to reduce the computing cost. As a result, attribute-based encryption with delegation emerges. Still, there are caveats and questions remaining in the previous relevant works. For instance, during the delegation, the cloud servers could tamper or replace the delegated ciphertext and respond a forged computing result with malicious intent. They may also cheat the eligible users by responding them that they are ineligible for the purpose of cost saving. Furthermore, during the encryption, the access policies may not be flexible enough as well. Since policy for general circuits enables to achieve the strongest form of access control, a construction for realizing circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation has been considered in our work. In such a system, combined with verifiable computation and encrypt-then-mac mechanism, the data confidentiality, the fine-grained access control and the correctness of the delegated computing results are well guaranteed at the same time. Besides, our scheme achieves security against chosen-plaintext attacks under the k-multilinear Decisional Diffie-Hellman assumption. Moreover, an extensive simulation campaign confirms the feasibility and efficiency of the proposed solution.
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...Pawan Arya
To design and implement a multi authority fully anonymous Attribute Based Encryption control scheme to address the data privacy and user identity privacy problems in cloud computing environment .
Data get to control is a powerful method to guarantee the data security in the cloud. Because of information
out sourcing and un confided in cloud servers, the information get to control turns into a testing issue in cloud
storage systems. Cipher text-Policy Attribute Based Encryption (CP-ABE) is viewed as a standout amongst
the most reasonable advancements for information get to control in distributed storage, since it gives
straightforward control access to the owners. It is hard to implement the existing CP-ABE schemes to access
the information from cloud storage systems. we propose a plan to structure the information securing control in
a revocable multi-expert CP-ABE conspire from cloud storage system
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Improved ciphertext-policy time using short elliptic curve Diffie–HellmanIJECEIAES
Ciphertext-policy attribute-based encryption (CP-ABE) is a suitable solution for the protection of data privacy and security in cloud storage services. In a CP-ABE scheme which provides an access structure with a set of attributes, users can decrypt messages only if they receive a key with the desired attributes. As the number of attributes increases, the security measures are strengthened proportionately, and they can be applied to longer messages as well. The decryption of these ciphertexts also requires a large decryption key which may increase the decryption time. In this paper, we proposed a new method for improving the access time to the CP using a new elliptic curve that enables a short key size to be distributed to the users that allows them to use the defined attributes for encryption and decryption. Each user has a specially created key which uses the defined attributes for encryption and decryption based on the Diffie-Hellman method. After the implement, the results show that this system saves nearly half of the execution time for encryption and decryption compared to previous methods. This proposed system provides guaranteed security by means of the elliptic curve discrete logarithmic problem.
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
Cloud computing is a distributed architecture where user can store their private, public or any application software components on it. Many cloud based privacy protection solutions have been implemented, however most of them only focus on limited data resources and storage format. Data confidentiality and inefficient data access methods are the major issues which block the cloud users to store their high dimensional data. With more and more cloud based applications are being available and stored on various cloud servers, a novel multi-user based privacy protection mechanism need to design and develop to improve the privacy protection on high dimensional data. In this paper, a novel integrity algorithm with attribute based encryption model was implemented to ensure confidentiality for high dimensional data security on cloud storage. The main objective of this model is to store, transmit and retrieve the high dimensional cloud data with low computational time and high security. Experimental results show that the proposed model has high data scalability, less computational time and low memory usage compared to traditional cloud based privacy protection models.
Key aggregate cryptosystem for scalable data sharing in cloud storage using pairng based cryptography. We used JPBC tool to implement Key Aggregate cryptosystem.
In attribute based encryption (ABE) scheme, attributes plays a very important role. Attribute –based encryption provides privacy protection for the users by a set of attributes. Now a days as cloud is most widely used in mostly all fields so there is need of keeping data more secure and confidential which is outsourced on the cloud. Security of the data in cloud database server is the key area of concern in the acceptance of cloud. It is required very high degree of privacy and authentication. In existing system used hierarchical authorization structure to reduce the burden and risk of a single authority .this paper proposes a hierarchical attribute based encryption which directly provides attribute value by user as well as data stored in different types of media.
This is the Fourth Chapter of Cisco Cyber Security Essentials course Which discusses the implementation aspects of Confidentiality via Encryption, Access Control Techniques
Key aggregate searchable encryption (kase) for group data sharing via cloud s...CloudTechnologies
We are the company providing Complete Solution for all Academic Final Year/Semester Student Projects. Our projects are
suitable for B.E (CSE,IT,ECE,EEE), B.Tech (CSE,IT,ECE,EEE),M.Tech (CSE,IT,ECE,EEE) B.sc (IT & CSE), M.sc (IT & CSE),
MCA, and many more..... We are specialized on Java,Dot Net ,PHP & Andirod technologies. Each Project listed comes with
the following deliverable: 1. Project Abstract 2. Complete functional code 3. Complete Project report with diagrams 4.
Database 5. Screen-shots 6. Video File
SERVICE AT CLOUDTECHNOLOGIES
IEEE, WEB, WINDOWS PROJECTS ON DOT NET, JAVA& ANDROID TECHNOLOGIES,EMBEDDED SYSTEMS,MAT LAB,VLSI DESIGN.
ME, M-TECH PAPER PUBLISHING
COLLEGE TRAINING
Thanks&Regards
cloudtechnologies
# 304, Siri Towers,Behind Prime Hospitals
Maitrivanam, Ameerpet.
Contact:-8121953811,8522991105.040-65511811
cloudtechnologiesprojects@gmail.com
http://cloudstechnologies.in/
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...JobandeepKaur2
This is the paper basically on the security of data in the cloud. Who to use various access policies and apply encryption and decryption on data stored in a cloud.
A Review Paper on Secure authentication and data sharing in cloud storage usi...ijsrd.com
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data again authentication. We describe new public-key cryptosystems that produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts is possible. Cryptosystem or cryptographic system is any sort of methodology for encoding and accessing that information. In this technique the master key holder can release a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, one can aggregate any set of secret keys and make them compact as a single key but encompassing the power of all the keys being aggregated.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
6th International Conference on Machine Learning & Applications (CMLA 2024)
Ijcatr04051002
1. International Journal of Computer Applications Technology and Research
Volume 4– Issue 5, 340 - 343, 2015, ISSN:- 2319–8656
www.ijcat.com 340
A Novel Constant size Cipher-text Scheme for
Security in Real-time Systems
M.Dhivya
Department of Computer
Science and Engineering
Panimalar Institute of
Technology, Chennai, India
Tina Belinda Miranda
Department of Computer
Science and Engineering
Panimalar Institute of
Technology, Chennai, India
S.Venkatraman
Department of Computer
Science and Engineering
Panimalar Institute of
Technology, Chennai, India
Abstract: In this paper, we consider ‘secure attribute based system with short ciphertext’ is a tool for implementing fine-grained
access control over encrypted data, and is conceptually similar to traditional access control methods such as Role-Based Access
Control. However, current ‘secure attribute based system with short ciphertext’ schemes suffer from the issue of having long
decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy ABE (CP-ABE)
provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in
order to decrypt the ciphertext. We propose a novel ‘secure attribute based system with short ciphertext’ scheme with constant-
size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits.
Keywords – Attribute Based Encryption, Ciphertext Policy, Short Decryption Key.
1. INTRODUCTION
LIGHTWEIGHT devices (e.g. Radio Frequency
Identification (RFID) tags) have been well known to have
many useful applications[1]. This is useful for
creating passports, ID cards and secret data storage, such as
cryptographic key storage. Authorized persons generate a
cryptographic key for each individual user. Then the key
embedded within a user’s ID card. The user can extract the
key from his/her ID card for a security use.
Lightweight devices usually have limited memory
capacity. This has become a major challenge to applications
such as key storage. Many encryption systems can offer
short decryption keys. Attribute-based encryption (ABE) is
an extension of identity-based encryption which allows
users to encrypt and decrypt messages based on attributes
and access structures. Ciphertext-policy attribute-based
encryption (CP-ABE) is a type of ABE schemes where the
decryption key is associated with a user’s attribute set. The
encryptor encrypt the attributes for protect the data. We
generate the group key for each individual user for protect
the sensitive data. The encryptor defines the access structure
to protect sensitive data such that only users whose
attributes satisfy the access structure can decrypt the
messages.[1]
Many CP-ABE schemes have been proposed for
various purposes such as short ciphertext and full security
proofs. However, we found no CP-ABE scheme with
expressive access structures in the literature addressing the
size issue of decryption keys, which seems to be a drawback
due to resource consumption. All existing CP-ABE schemes
suffer from the issue of long decryption keys, in which the
length is dependent on the number of attributes.[2]
This issue becomes more obvious, when CP-ABE
decryption keys are applied to storage-constrained devices.
Because of the popularity of lightweight devices and useful
applications of CP-ABE, in this work, we propose a
provably secure CP-ABE scheme that offers short
decryption keys, which are applicable for key storage in
lightweight devices.[1],[2]
2. ARCHITECTURE
Fig.1. System Architecture
2. International Journal of Computer Applications Technology and Research
Volume 4– Issue 5, 340 - 343, 2015, ISSN:- 2319–8656
www.ijcat.com 341
3. RELATED WORK
Attribute based Encryption consists of two variants
of ABE: Key-Policy ABE and Ciphertext-Policy ABE.
KP-ABE: In a KP-ABE scheme, the ciphertext encrypting
a message is associated with a set of attributes. A
decryption key issued by an authority is associated with an
access structure. The ciphertext can be decrypted with the
decryption key if and only if the attribute set of ciphertext
satisfies the access structure of decryption key.[12],[27]
CP-ABE: In a CP-ABE scheme, on the contrary, the
ciphertext encrypts a message with an access structure
while a decryption key is associated with a set of attributes.
The decryption condition is similar: if and only if the
attribute set fulfils the access structure[14].
John Bethencourt, Amit Sahai and Brent Waters
presented a system for realizing complex access control on
encrypted data that we call Ciphertext-Policy Attribute-
Based Encryption. collusion attacks. Our methods are
conceptually closer to traditional access control methods
such as Role-Based Access Control (RBAC). Our system
allows policies to be expressed as any monotonic tree
access structure and is resistant to collusion attacks in
which an attacker might obtain multiple remote keys.In
addition, we provide an implementation of our system and
give performance measurement.
Serge Vaudenay provide strong definitions for
security and privacy. Our model captures the notion of a
powerful adversary who can monitor all communications,
trace tags within a limited period of time, corrupt tags, and
get side channel information on the reader output. Prove
some constructions: narrow-strong and forward privacy
based on a public-key cryptosystem, narrow-destructive
privacy based on a random oracle, and weak privacy based
on a pseudo random function.[5]
Work by Omkant Pandey and Amit Sahai Presented
the first construction of a ciphertext-policy attribute based
encryption scheme having a security proof based on a
number theoretic assumption and supporting advanced
access structures.[33]
Guojun Wang,Qin Liu and Jie Wu propose a
hierarchical attribute-based encryption model by combining
a HIBE system and a CP-ABE system,to provide fine-
grained access control and full delegation.Based on this
model to achieve high performance.we construct several
traits such as high performance, fine-grained access
control, scalability and full delegation.
Charan, K.Dinesh kumar and D.Arun Kumar Reddy
propose verifiability guarantees that a user can effectively
check if the transformation is correctly and proved it is
secure. Attribute based Encryption schemes are that the
access policy can be classified as key-policy and cipher-
text policy.[4]
Kan Yang and Xiaohua Jia propose a revocable
multi-authority CP-ABE scheme and apply it as the
underlying technique to design the data access control
scheme which can be applied in any remote storage
systems, onlinesocial networks, etc..Attribute revocation
method is efficient and also it has less Communication
cost and Computation cost and is secure it can achieve
both backward security and for forward security.
Venkateshprasad.kalluri and D.Haritha presents a
Attribute –Based access to the media in the cloud where it
uses CP-ABE technique to create an access control
structure.By using this technique the encrypted data is
trustworthy even on the untrusted server and also this
requires flexible,cryptographic key management to support
difficult access policies Yi Mu proposed a novel dynamical
identity-based authenticated key management protocol to
optimize key management for a user with multiple
options.[8]
4. PROPOSED SYSTEM
In this proposed system scheme with constant-size
decryption keys independent of the number of attributes.
We found that the size can be as small as 672 bits. In
comparison with other schemes in the literature, the
proposed scheme is the only with expressive access
structures, which is suitable for ‘secure attribute based
system with short ciphertext’ key storage in lightweight
devices. Because of the popularity of lightweight devices
and useful applications of secure attribute based system
with short ciphertext’ , in this work, we propose a probably
secure proposed system scheme that offers short decryption
keys, which are applicable for key storage in lightweight
devices.[17],[18],[19]
CP-ABE works under four ways Setup, Encrypt
KeyGen and decrypt.
1. Setup:
The setup algorithm takes no input other than the
implicit security parameter. It outputs the public parameters
PK and a master key MK.
2. Encrypt (PK, M,A):
The encryption algorithm takes as input the public
parameters PK, a message M, and an access structure A
over the universe of attributes. The algorithm will encrypt
M and produce a ciphertext CT such that only a user that
possesses a set of attributes that satisfies the access
structure will be able to decrypt the message. We will
assume that the ciphertext implicitly contains A.[17]
3. Key Generation (MK, S):
The key generation algorithm takes as input the
master key MK and a set of attributes S that describe the
key. It outputs a private key SK.
4. Decrypt(PK,CT, SK):
The decryption algorithm takes as input the public
parameters PK, a ciphertext CT, which contains an access
policy A, and a private key SK, which is a private key or
set S of attributes. If the set S of attributes satisfies the
3. International Journal of Computer Applications Technology and Research
Volume 4– Issue 5, 340 - 343, 2015, ISSN:- 2319–8656
www.ijcat.com 342
access structure A then the algorithm will decrypt the
ciphertext and return a message M.[5]
Efficiency:
The decryption key of our scheme is composed of
two group elements only, and is independent of the number
of attributes. Recently proposed attribute based encryption
schemes in terms of policy type, access structure, security
model, length of decryption key and length of ciphertext.
We compare the efficiency of schemes under CPA (chosen
plaintext attack) security only as previous schemes utilized
different generalized security transformation from CPA to
CCA.[6],[7]
Fig.2. A Security use of decryption with decryption key
stored in RFID tags embedded within ID cards.
Modules:
Registration & ID Generation
Key Generation & Encryption
Uploading & Verification
Registration & ID Generation:
In this paper we develop a applying for Online Electronic
Passport for this user has to register application form. User
has to fill their own personal details and upload their
individual photo for registration. After they submit the
form authorized person will generate the ID for particular
registered person. ID can be generated for every registered
users.
Key Generation & Encryption:
Once Id has been generated authority will generate key for
every registered person. This key contains public, private
and secret key for each individual person. Based on the key
only, attributes are encrypted and provide the cipher text
values. Encryption is done independent on number of
attributes with constant size decryption keys.
Uploading & Verification:
Authority generates a short decryption key and uploading
into the device. Once encryption key has been generated it
must be uploaded into the light weight devices. When user
wants to see the content of his/her profile means he/she has
to retrieve the key from the device. After key has been read
from device they perform decryption and view full profile.
Here verification is carried out, when the uploaded key and
retrieved key are match means they perform some
operations otherwise they didn’t perform.
5. CONCLUSION
Light weight devices usually have limited memory
storage, which could be too small to store decryption
keys of secure attribute based system with short
ciphertext schemes. We develop a project using
ciphertext key for light weight devices. This CP-ABE
should contain security, Performance and
flexibility.[19]
Thus, the proposed scheme is very much
useful in real time security systems. Future works
may include schemes to reduce number of bits of key
without compromising the security feature.
Thus, the proposed work can improve the
real time systems.
which
6. REFERENCES
[1] S. Vaudenay, “On privacy models for RFID,” in Proc.
ASIACRYPT, 2007, vol. 4.
[2] C. Delerablée, “Identity-based broadcast encryption
with constant size ciphertexts and private keys,” in Proc.
ASIACRYPT, 2007, vol. 4.
[3] F. Guo, Y. Mu, and W. Susilo, “Identity-based traitor
tracing with short private key and short ciphertext,” in
Proc. ESORICS, 2012, vol. 7.
[4] F. Guo, Y. Mu, and Z. Chen, “Identity-based
encryption: How to decrypt multiple ciphertexts using a
single decryption key,” in Proc. Pairing, 2007, vol. 4.
[5] F. Guo, Y. Mu, Z. Chen, and L. Xu, “Multi-identity
single-key decryption without random oracles,” in Proc.
Inscrypt, 2007, vol. 4.
[6] H. Guo, C. Xu, Z. Li, Y. Yao, and Y. Mu,
“Efficient and dynamic key management for multiple
identities in identity-based systems,” Inf. Sci., vol. 2, Feb.
2013.
[7] D. Boneh and M. K. Franklin, “Identity-based
encryption from the weil pairing,” in Proc. CRYPTO,
2001, vol. 2.
[8] G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-
based encryption for fine-grained access control in cloud
storage services,” in Proc. ACM Conf. Comput. Commun.
Security, 2010.
4. International Journal of Computer Applications Technology and Research
Volume 4– Issue 5, 340 - 343, 2015, ISSN:- 2319–8656
www.ijcat.com 343
[9] J. Hur and D. K. Noh, “Attribute-based access control
with efficient revocation in data outsourcing systems,”
IEEE Trans. Parallel Distrib. Syst., vol. 22, Jul. 2011.
[10] Z. Wan, J. Liu, and R. H. Deng, “Hasbe: A
hierarchical attributebased solution for flexible and scalable
access control in cloud computing,” IEEE Trans. Inf.
Forensics Security, vol. 7, Apr. 2012.
[11] V. Goyal, O. Pandey, A. Sahai, and B.
Waters, “Attribute-based encryption for fine-grained access
control of encrypted data,” in Proc. ACM Conf. Comput.
Commun. Security, 2006.
[12] J. Bethencourt, A. Sahai, and B. Waters,
“Ciphertext-policy attribute based encryption,” in Proc.
IEEE Symp. Security Privacy, May 2007.
[13] L. Cheung and C. C. Newport, “Provably secure
ciphertext policy abe,” in Proc. ACM Conf. Comput.
Commun. Security, 2007.
[14] B. Waters, “Ciphertext-policy attribute-based
encryption: An expressive, efficient, and provably secure
realization,” in Proc. Public Key Cryptography., 2011, vol.
6.
[15] K. Emura, A. Miyaji, A. Nomura, K. Omote, and
M. Soshi, “A ciphertext-policy attribute-based encryption
scheme with constant ciphertext length,” in Proc. ISPEC,
2009, vol. 5.
[16] Z. Zhou and D. Huang, “On efficient ciphertext-policy
attribute based encryption and broadcast encryption:
Extended abstract,” in Proc. ACM Conf. Comput.
Commun. Security, 2010.
[17] J. Herranz, F. Laguillaumie, and C. Ràfols, “Constant
size ciphertexts in threshold attribute-based encryption,” in
Proc. Public Key Cryptography, 2010, vol. 6.
[18] A. B. Lewko, T. Okamoto, A. Sahai, K.Takashima,
and B. Waters, “Fully secure functional encryption:
Attribute-based encryption and (hierarchical) inner product
encryption,” in Proc. EUROCRYPT, 2010, vol. 6.
[19] A. B. Lewko and B. Waters, “New proof methods for
attribute-based encryption: Achieving full security through
selective techniques,” in Proc. CRYPTO, 2012, vol. 7.
[20] A. Sahai and B. Waters, “Fuzzy identity-based
encryption,” in Proc. EUROCRYPT, 2005, vol. 3.
[21] R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-
based encryption with non-monotonic access structures,” in
Proc. ACM Conf. Comput. Commun. Security, 2007.
[22] C. Chen et al., “Fully secure attribute-based systems
with short ciphertexts/signatures and threshold access
structures,” in Proc. CT-RSA, 2013, vol. 7. GUO et al.: CP-
ABE WITH CONSTANT-SIZE KEYS FOR
LIGHTWEIGHT DEVICES 771
[23] N. Attrapadung, B. Libert, and E. de Panafieu,
“Expressive key-policy attribute-based encryption with
constant-size ciphertexts,” in Proc. Public Key
Cryptography., 2011, vol. 6.
[24] C. Chen, Z. Zhang, and D. Feng, “Efficient ciphertext
policy attribute-based encryption with constant-size
ciphertext and constant computation-cost,” in Proc.
ProvSec, 2011, vol. 6.
[25] A. Ge, R. Zhang, C. Chen, C. Ma, and Z. Zhang,
“Threshold ciphertext policy attribute-based encryption
with constant size ciphertexts,” in Proc. ACISP, 2012, vol.
[26] T. Okamoto and K. Takashima, “Fully secure
unbounded inner-product and attribute-based encryption,”
in Proc. ASIACRYPT, 2012, vol. 7.
[27] V. Goyal, A. Jain, O. Pandey, and A. Sahai,
“Bounded ciphertext policy attribute based encryption,” in
Proc. 35th ICALP, 2008, vol. 5.
[28] A. Sahai and B. Waters, “Attribute-based
encryption for circuits from multilinear maps”,
CoRR, vol. abs/1210.5287, 2012.
its
[29] M. Chase, “Multi-authority attribute based
encryption,” in Proc. TCC, 2007, vol. 4.
[30] T. Nishide, K. Yoneyama, and K. Ohta,
“Attribute-based encryption with partially hidden
encryptor-specified access structures,” in Proc.
ACNS, 2008, vol. 5.
[31] S. Hohenberger and B. Waters, “Attribute-based
encryption with fast decryption,” in Proc. Public Key
Cryptography., 2013, vol.7.
[32] M. J. Hinek, S. Jiang, R. Safavi-Naini, and S. F.
Shahandashti, “Attribute-based encryption without
key cloning,” IJACT, vol. 2, 2012.
[33]Z. Liu, Z. Cao, and D. Wong, “White-box
traceable ciphertext-policy attribute-based encryption
supporting any monotone access structures,” IEEE
Trans. Inf. Forensics Security, vol. 8, Jan. 2013.