International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 114 | Views: 256

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Popularity: 6.3 / 10


     

Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing

Kamini H. Gonnade, Fazeel Zama


Abstract: In this paper, our main issue is an authorization and providing the data security for various applications in web services in a network. Cloud Computing is a revolutionary IT field and we are using this technology for various purposes. With the increasing use of the data sharing in distributed systems such as online social networks or cloud computing, there is increasing in concerns for data security while distributing or sharing data. Here, Ciphertext policy attribute-based Encryption (CP-ABE) is becoming cryptographic solution to above issue of secured data sharing among network. Also, we will have these achievements1) key escrow problem could be solved by escrow-free key issuing protocol, where key is generated using the secure two-party computation between the key generation center and the data-storing center 2) fine-grained user revocation per each attribute could be done by using anonymous id algorithm where sharing of data will be done on attribute basis.


Keywords: Data integrity, Data sharing, attribute-based encryption, removing escrow, privacy protection


Edition: Volume 4 Issue 5, May 2015


Pages: 2627 - 2631



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Kamini H. Gonnade, Fazeel Zama, "Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing", International Journal of Science and Research (IJSR), Volume 4 Issue 5, May 2015, pp. 2627-2631, https://www.ijsr.net/getabstract.php?paperid=SUB154865, DOI: https://www.doi.org/10.21275/SUB154865



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 1659 - 1668

Anomaly Detection: Enhancing Systems with Machine Learning

Yogananda Domlur Seetharama

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 1793 - 1802

Event - Driven Architecture: Building Responsive and Scalable Systems

Venkata Naga Sai Kiran Challa

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 772 - 776

Cryptographic Algorithm to Augment Data Security

Vipin R Bharadwaj, Nalina V, Rithvik Mohan V

Share this Article



Top