SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Journal of Engineering Inventions
e-ISSN: 2278-7461, p-ISSN: 2319-6491
Volume 4, Issue 1 (July 2014) PP: 06-10
www.ijeijournal.com Page | 6
CP-ABE Scheme with extended reliability factor and load
balancing in distributed n/w
Miss. Snehlata V. Gadge1
, Dr. S. T. Singh2
1
Research Scholar, Department of Computer Science, Pune, India
2
Professors, Department of Computer Science, Pune, India
Abstract: Several Data Security Methodology has been noticed, with recent adoption and spreading of data
sharing. One of the most interesting and definitive approach is Cipher text-Policy Attribute-Based Encryption
(CP-ABE).CP-ABE provides us with the indulgement of the access policies and its updates. It is used to set or
control outsourcing of data sharing; it deals with the issues in CP-ABE. This solution allows encryptor to deals
with the access control with respect to the access formula. The lacking of reliability factor lead to weaken the
system, therefore we will amplify CB-ABE by introducing some factor. Key Generation center (KGC) and data
storing center are the highlighted factors. KGC deals with the drawback of Key escrow problem. As KGC can
decrypt the users data as per KGC`s concerns, causing threat to the data sharing Systems. This is not favorable
for the distributed scheme where KGC is not trustworthy. Along with the key escrow problem, we will be
concerning with the problem of key-revocation that is degradation because of windows of vulnerability. These
issues are solved by exploiting the features characteristics of Architecture. The problem of key-escrow is
resolved using 2-pc protocol. And Key-revocation is proceeding by using proxy encryption.
Keyword: Distributed System, fair scheduling, Attribute, 2 pc, Access structure
I. Introduction
In the recent days the networking and computing environments need safe and flexible pace to cope
with the data sharing services in order to utilize time along the resources. Concerning to the matter of
technology .People now days can smoothly share their data, exchange their talks online. People can easily
contribute their happiness and express feelings towards each other by uploading their personal belonging like
private data, chats or snaps by uploading onto the social networking site such as face book or LinkedIn. Apart
from that they can upload their sensitive health records into data servers like Google Health or other private
servers for cost saving. Along with the bashing effects of the internet, the need of high security also arises with
proper setup and access controlling functionality. Incorrect use of the personal data by any storage server or
unauthorized access by outsider can be threat to security model making misuse of data in a wrong way.
Attribute based encryption technique determines decryption`s capability on bases of uses attributes.
This introduce us with the new public key primitive knows as Attribute based Encryption.ABE gives authority
to user in such a way that encryptor to define set of attribute over a whole place of attribute that a decryptor
should possess in order to decrypt the cipher text. User`s secret key is based on a set user`s credentials, and
cipher is generated based on the policy generated. Forward approach in which data sharing should be stored,
encrypted data before uploading to protect privacy were introduced in traditional public key infrastructure, data
encryption process can be adopted, and the owner of data prior to uploading the data to encrypt data uses the
public key users; If a user sends through the access request to the sharing, the sharing will return to the same
cipher text data user a user to decrypt the data using private key. But this matter would lead to some problems:
(1) to be able to encrypt data, the data owner needs to obtain the data user's public key to complete this; (2) a lot
of storage overhead would spend because of the same plaintext with different public keys.
In order to overcome these limitations Attribute based encryption came into existence.ABE first
identify user`s properties. ABE has advantage over traditional PKC ,as it favors‟ with one too many encryption
instead of one to one.ABE as a set of attribute, is used to encryption and decryption of data.ABE comes in two
flavors, 1) Cipher text-policy ABE 2) Key-policy ABE. In cipher text, attribute are mentioned to describe user`s
credentials, encryptor determines policy whether who can decrypt data.CPABE is more promising concept for
data sharing System as it allows to set access policy decisions in the data owner`s hand means secret key is
associated with a set of attributes, while in key-policy, reverse is the process, attributes are used to notify
encrypted data, and policy are built in user`s key. Sometimes it is not suitable in certain applications, as the
owner of data has to trust the key issue; apart access structure is KP-ABE is a monotonic access structure.
Negative attribute can`t be expressed, for excluding the entity with whom owner don`t want to share data. CP-
ABE plans to address problem of KP-ABE that trust only key-issuer data.
Recently with new, safe, and effective methods that features-based method of data sharing System by
exploiting a fine-grained data access control to implement sharing or distribution of data. Practically the better
efficiency ,scalability and security ,overcoming the limitations of exiting methods shows the methods of its
CP-ABE Scheme with extended reliability factor and load balancing in distributed network.
www.ijeijournal.com Page | 7
credibility as it handles many requests to single user key generator system. Thus to achieve reliability, aiming to
improve security, load balancing with increasing efficiency. In the further section II, we will be connecting with
literature survey over various methods in data distributed system. In section III the proposed approach with its
block diagram is depicted. In IV we will be dealing with the current state along with experimental setup and
results. Finally conclusion and future work is predicted in section V.
II. Literature Survey
This section will be detailed with the different methods those are presented to solve the trust security
issue and access policy controls in data sharing environment along reliability services.
 Sahai and B. Waters [5] introduced the concept of Fuzzy Identity Based Encryption, which allows for
error tolerance between the identity of a private key and the public key used to encrypt a cipher text. They
described two practical applications of Fuzzy IBE of encryption using biometrics and attribute-based
encryption. They presented our construction of a Fuzzy IBE scheme that uses set overlap as the distance
metric between identities. Finally, they proved our scheme under the Selective ID model by reducing it to
an assumption that can be viewed as a modified version of the Bilinear Decisional Diffie Hellman
assumption. As more sensitive data is shared and stored by third-party sites on the Internet, There is on
these sites will need to encrypt data stored. Encrypt data to a drawback is that it selectively only a coarse-
grained level can be shared (i.e., give your private key to another party). Features of working in our
cryptosystem texts are labeled with sets and private keys which are able to decrypt cipher strength texts
users are associated with access control structures.
 L. Ebrahimi, S. Nikova, M. Petkovic, P. Hartel, and W. Jonker [4] presented a mediated Cipher text-
Policy Attribute-Based Encryption (CP-ABE) which is the extension of CPABE with attribute revocation.
And demonstrate how to apply the mCP-ABE scheme to securely manage Personal Health Records.
 Chow [20] proposed an anonymous private key generation protocol in identity-based literature such that
the KGC can issue a private key to an authenticated user without knowing the list of users‟ identities. It
seems that this anonymous private key generation protocol works properly in ABE systems when we treat
an attribute as an identity in this construction.
 Junbeom Hur [1] specified the cause cases of corruption of KGC and corrupted data storing center, He
has provided with a proof of 2pc protocol. And presented new efficient and secured method for data
sharing systems. But the limitation of this system was reliability and load balancing under real time
environment.
III. PROPOSED APPROACH FRAMEWORK AND DESIGN
4.1 Problem Definition
The literature review presenting many methods for secure data sharing. In [1] we studied the approach
which is presented for improving the security and efficiency in attribute-based data sharing. This method
significantly overcomes the drawbacks of previous methods such as key escrow problem and scalability,
processing speed. Following figure 1 shows the architecture of this method. However we have identified some
problems in this system such as load balancing, reliability of system. In the existing system, the major role is
played by key generation system. If the number of requests or communication is more, then load on key
generation system becomes more and hence this resulted into slow response and cryptographic operations,
therefore loads needs to be balanced. Another problem is, if the key generation system fails, or downs
temporarily then whole security system downs. Hence needs to improve the reliability to this system.
Figure 1: Architecture of Security Method presented in [1].
CP-ABE Scheme with extended reliability factor and load balancing in distributed network.
www.ijeijournal.com Page | 8
4.2 Access Structure
Figure 2: Example of Access Structure (Access policy)
Let T be a tree representing an access structure. Each non-leaf node of the tree represents a threshold
gate, described by its children and a threshold value. . To facilitate working with the access trees, we define a
few functions. We denote the parent of the node x in the tree by parent(x). The function att(x) is defined only if
x is a leaf node and denotes the attribute associated with the leaf node x in the tree. The access tree T also
defines an ordering between the children of every node, that is, the children of a node are numbered from 1 to
num. The function index(x) returns such a number associated with the node x. Where the index values are
uniquely assigned to nodes in the access structure for a given key in an arbitrary manner.
4.3 Scope and Objectives
Main aim is to improve security with respect to distributed System, using third party protocol. By using
load balancing technique we are providing reliability to system
- To maintain data integrity, confidentiality as well consistency etc.
- Third party will work like as web service so it‟s an assurance for security to client data which will store
on server.
- The factor of reliability is improved by using load balancing technique
- To present the analysis of existing and proposed algorithms in order to claim the efficiency.
4.4 Proposed System Architecture
In this paper we are extending the method presented in [1] with aim of achieving the reliability,
scalability, load balancing etc. The solution to overcome the limitations of existing method is to add the new
backup key generation system which is having the same functionality which is presented in [1]. This increases
the system extra resource as well as cost, but it‟s always better to have reliable, efficient and load balanced
security system in place. Following figure 2 is showing the proposed system architecture. As showing in figure
2, there are two key generation center [1 and 2]. Rest all security algorithms and processes are same as given in
[1]. Here we added following two functionalities for key generation for load balancing and reliability.
Figure 3: Proposed Architecture
CP-ABE Scheme with extended reliability factor and load balancing in distributed network.
www.ijeijournal.com Page | 9
4.5 Algorithms
4.4.1 Two PC Protocol
KGC with Data storing centre are involved in 2-PC protocol. The user needs to get connected with both
the parties before getting the set of keys. The work of KGC is to authenticate users, along with the distribution
of the set of attribute keys. The generation of secure 2-pc protocol takes places via. KGC and Data Storing
Centre. It does the work of issuing the key components to user. So that user is able to generate secret key by
combining the key components received from the both authorities. Thus in order to overcome the problem of
key-escrow, 2-pc is introduced.
1. Init←setup (1ʎ
), works as trusted initialize and gives public key as output.
2. KGC generates public key and private key (PKk,MKk) ←KKGC()
3. Same as KGC generates the keys,Data Storing Center also generates the key,publiv and private
key(PKk,MKk) ←KDSC()
4. KeycommD (MKD,IDt)↔ Keycommk(MKk,IDt,aux)
5. SKK,ut←IssueKeyK(aux,s)
6. SKu,ut←IssueKeyD()
4.4.2Dynamic Load Balancing using fair scheduling algorithm
1. Create set of Queues.
{Queues statues is to be checked}
2. For each queue q1 in Q
3. While there are tasks in the queue do,
4. Assign demand rate of task,Xi
5. K=C/N
6. Xi<k
7. Assign Xi to ith task as fair rate (threshold)
Else
8. Assign to ith task as fair rate.
9. Calculate fair completion time ti(x) that is time slice
End while
End loop
10. While (Load of any processor is greater than average load processor) do
Selected for migration to other division
End While
11. Calculation of turnaround time, initial time, time taken .etc
VI. Results of Practical Work
Following figure shows the practical work done. Figure 3 shows expected Performance graph. As
shown in figure Number of user increases and this causing transferring of request to KGC2, improves the
response time and efficient results as directed in the graph.
Figure 4 Performance graph
VI. Conclusion and Future Work
We have presented the system which is based on efficient security method. The existing scheme was
based on attribute based data sharing security. New technique has been introduced by using the security
approach along with that we are merging the load balancing technique, which cause faster response in case
CP-ABE Scheme with extended reliability factor and load balancing in distributed network.
www.ijeijournal.com Page | 10
primary source gets down or get overloaded. This results in decreasing the response time from 3rd
party. The
results presented are showing our current state of work over proposed approach. For future work we will first
complete the practical analysis of proposed work and next will be try to enforce these policies on the multimedia
files. As well improve the proposed results and security.
Acknowledgements
I am highly grateful to Prof. S. T. Singh, for his sincere advice and guidance in my work. I warmly
express and acknowledge my special thanks.
REFERENCES
[1] Junbeom Hur, “Improving Security and Efficiency in Attribute-Based Data Sharing”, IEEE TRANSACTIONS ON KNOWLEDGE
AND DATA ENGINEERING, VOL. 25, NO. 10, OCTOBER 2013.
[2] D.Khader,” Attribute Based Authentication Schemes,” PhD Dissertation University of Bath, 2009.
[3] M. S. Hwang and I. C Lin, Introduction to Information and Network Security (4ed, in Chinese)," in Mc Grew Hill. In Taiwan, 2011.
[4] L. Ebrahimi, Q. Tang, P. Hartel, and W. Jonker, Efficient and provable secure cipher text-policy attribute-based encryption
Schemes, "In Proceedings of the In-formation Security Practice and Experience”, pp. 1-12, 2009.
[5] A. Sahai and B. Waters, Fuzzy identity based encryption," Advances in Cryptology”, V EUROCRYPT, vol. 3494 of LNCS, pp.
457-473, 2005.
[6] D. Nali, C. Adams, and A. Miri, Using threshold attribute-based encryption for practical biometric- based access control,"
International Journal of Net-work Security, vol. 1, no. 3, pp. 173-182, 2005.
[7] V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data," in
Proceedings of the 13th
ACM conference on Computer and communications security, pp. 89-98, 2006.
[8] R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with non-monotonic access structures," in Proceedings of the
14th ACM conference on Computer and communications security, pp. 195- 203, 2007.
[9] J. Anderson, “Computer Security Planning Study,” Technical Report 73-51, Air Force Electronic System Division, 1972.
[10] L. Ebrahimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated Cipher text-Policy Attribute-Based Encryption and Its
Application,” Proc. Int‟l Workshop Information Security Applications (WISA ‟09), pp. 309-323, 2009.
[11] Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” Proc. Int‟l Conf. Theory and Applications of Cryptographic Techniques
(Euro crypt ‟05), pp. 457-473, 2005.
[12] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,”
Proc. ACM Conf. Computer and Comm. Security, pp. 89-98, 2006.
[13] J. Bettencourt, A. Sahai, and B. Waters, “Cipher text Policy. Attribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy,
pp. 321-334, 2007.R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-Based Encryption with Non-Monotonic Access Structures,”
Proc. ACM Conf. Computer and Comm. Security, pp. 195-203, 2007.
[14] John Bettencourt, Amit Sahai, Brent Waters-„Cipher text-Policy Attribute-Based Encryption.
[15] M. Chase and S.S.M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” Proc. ACM Conf.
Computer and Comm. Security, pp. 121-130, 2009.
[16] S.S.M. Chow, “Removing Escrow from Identity-Based Encryption,” Proc. Int‟l Conf. Practice and Theory in Public Key
Cryptography (PKC ‟09), pp. 256-276, 2009.

Más contenido relacionado

La actualidad más candente

Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Migrant Systems
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)ElavarasaN GanesaN
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based datahemanthbbc
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET Journal
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Privacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential DatabasePrivacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential Databaseijdmtaiir
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudJAVVAJI VENKATA RAO
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringIEEEFINALYEARPROJECTS
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 

La actualidad más candente (17)

Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Privacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential DatabasePrivacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential Database
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 

Similar a B04010610

IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET Journal
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computingijsrd.com
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformNexgen Technology
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformNexgen Technology
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
 
Improved ciphertext-policy time using short elliptic curve Diffie–Hellman
Improved ciphertext-policy time using short elliptic curve  Diffie–HellmanImproved ciphertext-policy time using short elliptic curve  Diffie–Hellman
Improved ciphertext-policy time using short elliptic curve Diffie–HellmanIJECEIAES
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountabilityNandini Chandran
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...IJERA Editor
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based dataASAITHAMBIRAJAA
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
V1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docV1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docpraveena06
 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityEditor IJMTER
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
 

Similar a B04010610 (20)

IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
C04932125
C04932125C04932125
C04932125
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
Improved ciphertext-policy time using short elliptic curve Diffie–Hellman
Improved ciphertext-policy time using short elliptic curve  Diffie–HellmanImproved ciphertext-policy time using short elliptic curve  Diffie–Hellman
Improved ciphertext-policy time using short elliptic curve Diffie–Hellman
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
Ijcatr04051007
Ijcatr04051007Ijcatr04051007
Ijcatr04051007
 
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
V1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docV1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.doc
 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentiality
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
 

Más de IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

Más de IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

B04010610

  • 1. International Journal of Engineering Inventions e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 4, Issue 1 (July 2014) PP: 06-10 www.ijeijournal.com Page | 6 CP-ABE Scheme with extended reliability factor and load balancing in distributed n/w Miss. Snehlata V. Gadge1 , Dr. S. T. Singh2 1 Research Scholar, Department of Computer Science, Pune, India 2 Professors, Department of Computer Science, Pune, India Abstract: Several Data Security Methodology has been noticed, with recent adoption and spreading of data sharing. One of the most interesting and definitive approach is Cipher text-Policy Attribute-Based Encryption (CP-ABE).CP-ABE provides us with the indulgement of the access policies and its updates. It is used to set or control outsourcing of data sharing; it deals with the issues in CP-ABE. This solution allows encryptor to deals with the access control with respect to the access formula. The lacking of reliability factor lead to weaken the system, therefore we will amplify CB-ABE by introducing some factor. Key Generation center (KGC) and data storing center are the highlighted factors. KGC deals with the drawback of Key escrow problem. As KGC can decrypt the users data as per KGC`s concerns, causing threat to the data sharing Systems. This is not favorable for the distributed scheme where KGC is not trustworthy. Along with the key escrow problem, we will be concerning with the problem of key-revocation that is degradation because of windows of vulnerability. These issues are solved by exploiting the features characteristics of Architecture. The problem of key-escrow is resolved using 2-pc protocol. And Key-revocation is proceeding by using proxy encryption. Keyword: Distributed System, fair scheduling, Attribute, 2 pc, Access structure I. Introduction In the recent days the networking and computing environments need safe and flexible pace to cope with the data sharing services in order to utilize time along the resources. Concerning to the matter of technology .People now days can smoothly share their data, exchange their talks online. People can easily contribute their happiness and express feelings towards each other by uploading their personal belonging like private data, chats or snaps by uploading onto the social networking site such as face book or LinkedIn. Apart from that they can upload their sensitive health records into data servers like Google Health or other private servers for cost saving. Along with the bashing effects of the internet, the need of high security also arises with proper setup and access controlling functionality. Incorrect use of the personal data by any storage server or unauthorized access by outsider can be threat to security model making misuse of data in a wrong way. Attribute based encryption technique determines decryption`s capability on bases of uses attributes. This introduce us with the new public key primitive knows as Attribute based Encryption.ABE gives authority to user in such a way that encryptor to define set of attribute over a whole place of attribute that a decryptor should possess in order to decrypt the cipher text. User`s secret key is based on a set user`s credentials, and cipher is generated based on the policy generated. Forward approach in which data sharing should be stored, encrypted data before uploading to protect privacy were introduced in traditional public key infrastructure, data encryption process can be adopted, and the owner of data prior to uploading the data to encrypt data uses the public key users; If a user sends through the access request to the sharing, the sharing will return to the same cipher text data user a user to decrypt the data using private key. But this matter would lead to some problems: (1) to be able to encrypt data, the data owner needs to obtain the data user's public key to complete this; (2) a lot of storage overhead would spend because of the same plaintext with different public keys. In order to overcome these limitations Attribute based encryption came into existence.ABE first identify user`s properties. ABE has advantage over traditional PKC ,as it favors‟ with one too many encryption instead of one to one.ABE as a set of attribute, is used to encryption and decryption of data.ABE comes in two flavors, 1) Cipher text-policy ABE 2) Key-policy ABE. In cipher text, attribute are mentioned to describe user`s credentials, encryptor determines policy whether who can decrypt data.CPABE is more promising concept for data sharing System as it allows to set access policy decisions in the data owner`s hand means secret key is associated with a set of attributes, while in key-policy, reverse is the process, attributes are used to notify encrypted data, and policy are built in user`s key. Sometimes it is not suitable in certain applications, as the owner of data has to trust the key issue; apart access structure is KP-ABE is a monotonic access structure. Negative attribute can`t be expressed, for excluding the entity with whom owner don`t want to share data. CP- ABE plans to address problem of KP-ABE that trust only key-issuer data. Recently with new, safe, and effective methods that features-based method of data sharing System by exploiting a fine-grained data access control to implement sharing or distribution of data. Practically the better efficiency ,scalability and security ,overcoming the limitations of exiting methods shows the methods of its
  • 2. CP-ABE Scheme with extended reliability factor and load balancing in distributed network. www.ijeijournal.com Page | 7 credibility as it handles many requests to single user key generator system. Thus to achieve reliability, aiming to improve security, load balancing with increasing efficiency. In the further section II, we will be connecting with literature survey over various methods in data distributed system. In section III the proposed approach with its block diagram is depicted. In IV we will be dealing with the current state along with experimental setup and results. Finally conclusion and future work is predicted in section V. II. Literature Survey This section will be detailed with the different methods those are presented to solve the trust security issue and access policy controls in data sharing environment along reliability services.  Sahai and B. Waters [5] introduced the concept of Fuzzy Identity Based Encryption, which allows for error tolerance between the identity of a private key and the public key used to encrypt a cipher text. They described two practical applications of Fuzzy IBE of encryption using biometrics and attribute-based encryption. They presented our construction of a Fuzzy IBE scheme that uses set overlap as the distance metric between identities. Finally, they proved our scheme under the Selective ID model by reducing it to an assumption that can be viewed as a modified version of the Bilinear Decisional Diffie Hellman assumption. As more sensitive data is shared and stored by third-party sites on the Internet, There is on these sites will need to encrypt data stored. Encrypt data to a drawback is that it selectively only a coarse- grained level can be shared (i.e., give your private key to another party). Features of working in our cryptosystem texts are labeled with sets and private keys which are able to decrypt cipher strength texts users are associated with access control structures.  L. Ebrahimi, S. Nikova, M. Petkovic, P. Hartel, and W. Jonker [4] presented a mediated Cipher text- Policy Attribute-Based Encryption (CP-ABE) which is the extension of CPABE with attribute revocation. And demonstrate how to apply the mCP-ABE scheme to securely manage Personal Health Records.  Chow [20] proposed an anonymous private key generation protocol in identity-based literature such that the KGC can issue a private key to an authenticated user without knowing the list of users‟ identities. It seems that this anonymous private key generation protocol works properly in ABE systems when we treat an attribute as an identity in this construction.  Junbeom Hur [1] specified the cause cases of corruption of KGC and corrupted data storing center, He has provided with a proof of 2pc protocol. And presented new efficient and secured method for data sharing systems. But the limitation of this system was reliability and load balancing under real time environment. III. PROPOSED APPROACH FRAMEWORK AND DESIGN 4.1 Problem Definition The literature review presenting many methods for secure data sharing. In [1] we studied the approach which is presented for improving the security and efficiency in attribute-based data sharing. This method significantly overcomes the drawbacks of previous methods such as key escrow problem and scalability, processing speed. Following figure 1 shows the architecture of this method. However we have identified some problems in this system such as load balancing, reliability of system. In the existing system, the major role is played by key generation system. If the number of requests or communication is more, then load on key generation system becomes more and hence this resulted into slow response and cryptographic operations, therefore loads needs to be balanced. Another problem is, if the key generation system fails, or downs temporarily then whole security system downs. Hence needs to improve the reliability to this system. Figure 1: Architecture of Security Method presented in [1].
  • 3. CP-ABE Scheme with extended reliability factor and load balancing in distributed network. www.ijeijournal.com Page | 8 4.2 Access Structure Figure 2: Example of Access Structure (Access policy) Let T be a tree representing an access structure. Each non-leaf node of the tree represents a threshold gate, described by its children and a threshold value. . To facilitate working with the access trees, we define a few functions. We denote the parent of the node x in the tree by parent(x). The function att(x) is defined only if x is a leaf node and denotes the attribute associated with the leaf node x in the tree. The access tree T also defines an ordering between the children of every node, that is, the children of a node are numbered from 1 to num. The function index(x) returns such a number associated with the node x. Where the index values are uniquely assigned to nodes in the access structure for a given key in an arbitrary manner. 4.3 Scope and Objectives Main aim is to improve security with respect to distributed System, using third party protocol. By using load balancing technique we are providing reliability to system - To maintain data integrity, confidentiality as well consistency etc. - Third party will work like as web service so it‟s an assurance for security to client data which will store on server. - The factor of reliability is improved by using load balancing technique - To present the analysis of existing and proposed algorithms in order to claim the efficiency. 4.4 Proposed System Architecture In this paper we are extending the method presented in [1] with aim of achieving the reliability, scalability, load balancing etc. The solution to overcome the limitations of existing method is to add the new backup key generation system which is having the same functionality which is presented in [1]. This increases the system extra resource as well as cost, but it‟s always better to have reliable, efficient and load balanced security system in place. Following figure 2 is showing the proposed system architecture. As showing in figure 2, there are two key generation center [1 and 2]. Rest all security algorithms and processes are same as given in [1]. Here we added following two functionalities for key generation for load balancing and reliability. Figure 3: Proposed Architecture
  • 4. CP-ABE Scheme with extended reliability factor and load balancing in distributed network. www.ijeijournal.com Page | 9 4.5 Algorithms 4.4.1 Two PC Protocol KGC with Data storing centre are involved in 2-PC protocol. The user needs to get connected with both the parties before getting the set of keys. The work of KGC is to authenticate users, along with the distribution of the set of attribute keys. The generation of secure 2-pc protocol takes places via. KGC and Data Storing Centre. It does the work of issuing the key components to user. So that user is able to generate secret key by combining the key components received from the both authorities. Thus in order to overcome the problem of key-escrow, 2-pc is introduced. 1. Init←setup (1ʎ ), works as trusted initialize and gives public key as output. 2. KGC generates public key and private key (PKk,MKk) ←KKGC() 3. Same as KGC generates the keys,Data Storing Center also generates the key,publiv and private key(PKk,MKk) ←KDSC() 4. KeycommD (MKD,IDt)↔ Keycommk(MKk,IDt,aux) 5. SKK,ut←IssueKeyK(aux,s) 6. SKu,ut←IssueKeyD() 4.4.2Dynamic Load Balancing using fair scheduling algorithm 1. Create set of Queues. {Queues statues is to be checked} 2. For each queue q1 in Q 3. While there are tasks in the queue do, 4. Assign demand rate of task,Xi 5. K=C/N 6. Xi<k 7. Assign Xi to ith task as fair rate (threshold) Else 8. Assign to ith task as fair rate. 9. Calculate fair completion time ti(x) that is time slice End while End loop 10. While (Load of any processor is greater than average load processor) do Selected for migration to other division End While 11. Calculation of turnaround time, initial time, time taken .etc VI. Results of Practical Work Following figure shows the practical work done. Figure 3 shows expected Performance graph. As shown in figure Number of user increases and this causing transferring of request to KGC2, improves the response time and efficient results as directed in the graph. Figure 4 Performance graph VI. Conclusion and Future Work We have presented the system which is based on efficient security method. The existing scheme was based on attribute based data sharing security. New technique has been introduced by using the security approach along with that we are merging the load balancing technique, which cause faster response in case
  • 5. CP-ABE Scheme with extended reliability factor and load balancing in distributed network. www.ijeijournal.com Page | 10 primary source gets down or get overloaded. This results in decreasing the response time from 3rd party. The results presented are showing our current state of work over proposed approach. For future work we will first complete the practical analysis of proposed work and next will be try to enforce these policies on the multimedia files. As well improve the proposed results and security. Acknowledgements I am highly grateful to Prof. S. T. Singh, for his sincere advice and guidance in my work. I warmly express and acknowledge my special thanks. REFERENCES [1] Junbeom Hur, “Improving Security and Efficiency in Attribute-Based Data Sharing”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 25, NO. 10, OCTOBER 2013. [2] D.Khader,” Attribute Based Authentication Schemes,” PhD Dissertation University of Bath, 2009. [3] M. S. Hwang and I. C Lin, Introduction to Information and Network Security (4ed, in Chinese)," in Mc Grew Hill. In Taiwan, 2011. [4] L. Ebrahimi, Q. Tang, P. Hartel, and W. Jonker, Efficient and provable secure cipher text-policy attribute-based encryption Schemes, "In Proceedings of the In-formation Security Practice and Experience”, pp. 1-12, 2009. [5] A. Sahai and B. Waters, Fuzzy identity based encryption," Advances in Cryptology”, V EUROCRYPT, vol. 3494 of LNCS, pp. 457-473, 2005. [6] D. Nali, C. Adams, and A. Miri, Using threshold attribute-based encryption for practical biometric- based access control," International Journal of Net-work Security, vol. 1, no. 3, pp. 173-182, 2005. [7] V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data," in Proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006. [8] R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with non-monotonic access structures," in Proceedings of the 14th ACM conference on Computer and communications security, pp. 195- 203, 2007. [9] J. Anderson, “Computer Security Planning Study,” Technical Report 73-51, Air Force Electronic System Division, 1972. [10] L. Ebrahimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated Cipher text-Policy Attribute-Based Encryption and Its Application,” Proc. Int‟l Workshop Information Security Applications (WISA ‟09), pp. 309-323, 2009. [11] Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” Proc. Int‟l Conf. Theory and Applications of Cryptographic Techniques (Euro crypt ‟05), pp. 457-473, 2005. [12] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. ACM Conf. Computer and Comm. Security, pp. 89-98, 2006. [13] J. Bettencourt, A. Sahai, and B. Waters, “Cipher text Policy. Attribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy, pp. 321-334, 2007.R. Ostrovsky, A. Sahai, and B. Waters, “Attribute-Based Encryption with Non-Monotonic Access Structures,” Proc. ACM Conf. Computer and Comm. Security, pp. 195-203, 2007. [14] John Bettencourt, Amit Sahai, Brent Waters-„Cipher text-Policy Attribute-Based Encryption. [15] M. Chase and S.S.M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” Proc. ACM Conf. Computer and Comm. Security, pp. 121-130, 2009. [16] S.S.M. Chow, “Removing Escrow from Identity-Based Encryption,” Proc. Int‟l Conf. Practice and Theory in Public Key Cryptography (PKC ‟09), pp. 256-276, 2009.