SECURED ATTRIBUTE BASED DATA SHARING Students of BE Computer (original) (raw)

Secure System Implementation Using Attribute Based Encryption

2015

Today there is an demand of distributed data security in data sharing system such as social network or cloud computing challenging issue in data sharing system is access policy and support of policy update. The cryptographic solution to this issue is Cipher text policy Attribute based encryption. In Which data owner defines their access policy over user attribute and applies this policy on data. The problem introduce the Scheme is called as key escrow problem, in which key generation center decrypt any message which addressed to the User by generating there private key. these approach is not suitable for data sharing scenario, also it introduce the another challenge called revocation. Data accessible to only authorized user. The proposed CPABE scheme is used to solve the key escrow problem by 2pc protocol between generation center and data storing center. Proposed work consists of also immediate user Revocation.

A Survey on Attribute Based Encryption Schemes for Data Sharing

2016

As sensitive data is stored and shared by third party sites on the Internet, there will be a need to encrypt data stored at these sites. Attribute Based Encryption (ABE) schemes is a vision of public key encryption mechanism that allows users to encrypt and decrypt messages based on user attributes. ABE takes attributes as public key and associates them with the ciphertext and user’s secret key. It is an efficient way to solve open problems in access control scenarios. In this paper, we survey the basic Attribute Based Encryption (ABE) scheme and its two varients: Keypolicy ABE (KP-ABE) scheme and the Ciphertext-policy ABE (CP-ABE) scheme.

Analysis of Cryptographic Techniques for Attribute based Data Sharing

— Now a day's most of the people move their data to cloud services due to which it saves enormous cost. But they are taken aback due to one main reason " Security ". The vulnerabilities of cloud storage are extremely high, even the leading service providers have been compromised at some point .This paper is focusing on various modern techniques like key policy attribute based encryption, Ciphertext policy attribute based encryption, Hierarchical attribute based Encryption are discussed. So that it will be helpful for us to provide more security against vulnerabilities in cloud storage that are identified to be exploited.

Ciphertext-Policy Attribute-Based Encryption

In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such policies is to employ a trusted server to store the data and mediate access control. However, if any server storing the data is compromised, then the confidentiality of the data will be compromised. In this paper we present a system for realizing complex access control on encrypted data that we call Ciphertext-Policy Attribute-Based Encryption. By using our techniques encrypted data can be kept confidential even if the storage server is untrusted; moreover, our methods are secure against collusion attacks. Previous Attribute-Based Encryption systems used attributes to describe the encrypted data and built policies into user's keys; while in our system attributes are used to describe a user's credentials, and a party encrypting data determines a policy for who can decrypt. Thus, our methods are conceptually closer to traditional access control methods such as Role-Based Access Control (RBAC). In addition, we provide an implementation of our system and give performance measurements.

IJERT-A Survey on Attribute-Based Encryption Technique for Scalable Data Sharing in Cloud Storage

International Journal of Engineering Research and Technology (IJERT), 2020

https://www.ijert.org/a-survey-on-attribute-based-encryption-technique-for-scalable-data-sharing-in-cloud-storage https://www.ijert.org/research/a-survey-on-attribute-based-encryption-technique-for-scalable-data-sharing-in-cloud-storage-IJERTCONV8IS03026.pdf Cloud computing provides the flexible architecture to share the applications as well as the other network resources. Cloud storage enables networked online storage. Key management and key sharing plays the main role in the data sharing concept of cloud computing. While cloud computing brings new and challenging security threats to the outsourced data. Hence data owner does not have any control to ensure data security in host data centers. In this paper, Cipher text policy attribute-based encryption (CP-ABE) is introduced with Key aggregate cryptosystem a promising cryptographic solution to this issue. It enables data owners to define their own access policies over user attributes and enforce the policies on the data to be distributed and Attribute policies, Cipher text policies are being aggregated. This effectively eliminates the need to rely on the data storage server for preventing unauthorized data access and integrity. Adding User revocation model enables removing access to suspicious users and Intrusion detection system to alert the owner during defined attacks noticed.

Secure and Reliable Data sharing scheme using Attribute-based Encryption with weighted attribute-based Encryption in Cloud Environment

IJEER, 2021

The field of data management has been reformed by the Cloud computing technologies which offered valuable establishments and amended the storage restrictions barriers for its users. In large enterprises the cloud has been extensively used for implementation due to its benefits. There are still lot of security threats for the data in the cloud. The data owners suffer from its privacy issues which are considered as one of the major concerns. Data privacy can be secured by employing some of the existing methods such as Attribute-based Encryption (ABE). Yet, the security issues are prevailing largely over the cloud. In this research a secured data access control is proposed using the Advanced Encryption Standard (AES) combined with a weighted attribute-based Encryption (AES-WABE). To encrypt the data, the access control policies are used and weight is assigned according to its significance of each attribute. The outsourced data is stored by the cloud service provider and the attribute authority based on the weight that updates the attributes. To minimize the computational overload the data file is accessed by the receiver corresponding to its weight. The proposed procedure provides resistance for collusion, multiple user security with control of fine-grained access based on protection, reliability and efficiency. On concerning the data collaboration and confidentiality, the performance rating is done related with the Cipher-text Policy-Attribute-based Encryption (CP-ABE) and the hybrid attribute-based encryption (HABE) scheme, access control flexibility, limited decryption, full delegation, verification and partial signing.