International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 106 | Views: 191

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015 | Rating: 6.4 / 10


Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire | Prashant Jawalkar [3]


Abstract: The late selection and dissemination of the information imparting ideal model in circulated frameworks, for example, online informal organizations or distributed computing, there have been expanding requests and attentiveness toward appropriated information security. A standout amongst the most difficult issues in information imparting frameworks is the implementation of access approaches and the backing of arrangements overhauls. Ciphertext policy attribute-based encryption (CP-ABE) is turning into a guaranteeing cryptographic answer for this issue. It empowers information holders to characterize their own particular access approaches over client attributes and implement the strategies on the information to be circulated. Notwithstanding, the playing point accompanies a significant downside which is known as an issue escrow problem. The key era focus could decode any messages tended to particular clients by creating their private keys. This is not suitable for information imparting situations where the information holder might want to make their private information just open to assigned clients. What's more, applying CP-ABE in the information offering framework acquaints an alternate test concerning the client repudiation since the right to gain entrance strategies are characterized just over the attribute universe. Consequently, in this study, a novel CP-ABE plan for an information offering framework by misusing the normal for the framework structural engineering. The plan offers the accompanying accomplishments 1) the key escrow problem could be understood by without escrow key issuing convention, which is built utilizing the safe two-gathering reckoning between the key era focus and the information putting away focus, and 2) fine-grained client disavowal for every each one attribute might be possible as a substitute encryption which exploits the particular attribute gathering key dissemination on top of the ABE. The execution and security examinations show that the proposed plan is effective to safely deal with the information appropriated in the information imparting framework.


Keywords: Data sharing, revocation, access control, removing escrow, Ciphertext, encryption


Edition: Volume 4 Issue 6, June 2015,


Pages: 1687 - 1689



How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top