Security & Efficiency Enhancement in Attribute Based Distributed Data Sharing (original) (raw)
Related papers
Secure System Implementation Using Attribute Based Encryption
2015
Today there is an demand of distributed data security in data sharing system such as social network or cloud computing challenging issue in data sharing system is access policy and support of policy update. The cryptographic solution to this issue is Cipher text policy Attribute based encryption. In Which data owner defines their access policy over user attribute and applies this policy on data. The problem introduce the Scheme is called as key escrow problem, in which key generation center decrypt any message which addressed to the User by generating there private key. these approach is not suitable for data sharing scenario, also it introduce the another challenge called revocation. Data accessible to only authorized user. The proposed CPABE scheme is used to solve the key escrow problem by 2pc protocol between generation center and data storing center. Proposed work consists of also immediate user Revocation.
Analysis of Cryptographic Techniques for Attribute based Data Sharing
— Now a day's most of the people move their data to cloud services due to which it saves enormous cost. But they are taken aback due to one main reason " Security ". The vulnerabilities of cloud storage are extremely high, even the leading service providers have been compromised at some point .This paper is focusing on various modern techniques like key policy attribute based encryption, Ciphertext policy attribute based encryption, Hierarchical attribute based Encryption are discussed. So that it will be helpful for us to provide more security against vulnerabilities in cloud storage that are identified to be exploited.
SECURED ATTRIBUTE BASED DATA SHARING Students of BE Computer
With the recent embracement and radiation of the data sharing standards in distributed systems, there have been increasing demands and concerns for distributed data assurance. One of the most challenging issues in data sharing systems is the enforcement of access policies and the support of policies updates. Ciphertext policy attribute-based encryption (CP-ABE) is becoming a promising cryptographic solution to this issue. By using this technique encrypted data can be kept confidential even if the storage server is untrusted; moreover, this method is secured against collusion attacks. It enables data owners to define their own access policies over user attributes and enforce the policies on the data which to be distributed. But it has problem known as a key escrow problem. The key generation center could decrypt any messages addressed to specific users by generating their private keys. In addition, applying CP-ABE in the data sharing system introduces another challenge with regard to the user revocation since the access policies are defined only among the attribute set. Therefore here we come up with secured attribute based data sharing CP-ABE scheme by applying the characteristic of the system architecture. Itresults in following achievements: The key escrow problem could be solved by Escrow-Free Key Issuing Protocol and revocation per each attribute could be done by proxy encryption which takes advantage of the selective attribute group key distribution on top of the ABE.
IJEER, 2021
The field of data management has been reformed by the Cloud computing technologies which offered valuable establishments and amended the storage restrictions barriers for its users. In large enterprises the cloud has been extensively used for implementation due to its benefits. There are still lot of security threats for the data in the cloud. The data owners suffer from its privacy issues which are considered as one of the major concerns. Data privacy can be secured by employing some of the existing methods such as Attribute-based Encryption (ABE). Yet, the security issues are prevailing largely over the cloud. In this research a secured data access control is proposed using the Advanced Encryption Standard (AES) combined with a weighted attribute-based Encryption (AES-WABE). To encrypt the data, the access control policies are used and weight is assigned according to its significance of each attribute. The outsourced data is stored by the cloud service provider and the attribute authority based on the weight that updates the attributes. To minimize the computational overload the data file is accessed by the receiver corresponding to its weight. The proposed procedure provides resistance for collusion, multiple user security with control of fine-grained access based on protection, reliability and efficiency. On concerning the data collaboration and confidentiality, the performance rating is done related with the Cipher-text Policy-Attribute-based Encryption (CP-ABE) and the hybrid attribute-based encryption (HABE) scheme, access control flexibility, limited decryption, full delegation, verification and partial signing.
A Survey on Attribute Based Encryption Schemes for Data Sharing
2016
As sensitive data is stored and shared by third party sites on the Internet, there will be a need to encrypt data stored at these sites. Attribute Based Encryption (ABE) schemes is a vision of public key encryption mechanism that allows users to encrypt and decrypt messages based on user attributes. ABE takes attributes as public key and associates them with the ciphertext and user’s secret key. It is an efficient way to solve open problems in access control scenarios. In this paper, we survey the basic Attribute Based Encryption (ABE) scheme and its two varients: Keypolicy ABE (KP-ABE) scheme and the Ciphertext-policy ABE (CP-ABE) scheme.
International Journal of Engineering Research and Technology (IJERT), 2014
https://www.ijert.org/a-framework-of-scalable-and-secure-sharing-of-personal-health-record-in-cloud-using-enhanced-multi-authority-attribute-based-encryption https://www.ijert.org/research/a-framework-of-scalable-and-secure-sharing-of-personal-health-record-in-cloud-using-enhanced-multi-authority-attribute-based-encryption-IJERTV3IS041986.pdf Personal Health Record is a recently growing technology in cloud which allow users to store and access their health record in one centralized place. To provide high security for user data, encrypt each record before stored it to the cloud server. For encryption use RSA algorithm because there is no attacker is hack the data from the RSA encrypted data. To reduce the key management complexity Attribute Based Encryption method is recently used. ABE is used to generate access policy or procedures to access PHR. To handle the remote user in an efficient manner divide the users in the system into public domain and personal domain based on user roles. For personal domain PHR owner provide access policies and distribute the key. In public domain an enhanced MA-ABE scheme is used. The key and access policy for public domain is distributed by TPA. In this way the PHR service is work well in cloud environment and reduce the task of owner and user and also provide secure and efficient access of PHR.
A Survey on Secure User Data Transaction using Attribute - Based Encryption Scheme over Cloud Data
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
Cloud computing is an innovation which utilizes the Internet to store, oversee, and register the information, as opposed to a nearby server or a PC. Clients can access the cloud condition wherever they need on compensation for each utilization way. Transferring of delicate information on un-believed servers in the cloud is a testing assignment. Established encryption procedures are utilized when the re-appropriating of information in the cloud to give access control and secrecy. Access control instruments are not doable in the cloud as a result of the absence of adaptability, versatility, and fine-grained access control. As an option, So, Attribute-Based Encryption (ABE) procedures are acquainted in the cloud with increment the security and adaptability. Attribute-based encryption is an open key cryptographic strategy in which the private key and figure content are based on the attributes. ABE involves IBE, KP-ABE, and CP-ABE. In Identity-Based Encryption (IBE) the mystery key and the attributes are based on the character of the client. In Ciphertext-Policy Attribute-Based Encryption (CP-ABE) a mystery key is gotten from the arrangement of attributes and the access strategy is defined over the universe of attributes inside the framework. In Key Policy – Attribute-Based Encryption (KP – ABE) the figure content is related to the arrangement of attributes and the mystery key is based on the access structure. This paper is a study of all ABE strategies and specialty an evaluation table about ABE keys job in cloud condition.