SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 2098
Survey Paper on CP-ABE cloud computing
Poornima G. Pawar, Prof. V. D. Thombre
Department of Computer Engineering, Savitribai Phule,Pune University SKN Institute of Technology & Science, Lonavala,
Pune Maharashtra India
Abstract— In attribute based encryption (ABE) scheme,
attributes plays a very important role. Attribute –based
encryption provides privacy protection for the users by a
set of attributes. Now a days as cloud is most widely used
in mostly all fields so there is need of keeping data more
secure and confidential which is outsourced on the cloud.
Security of the data in cloud database server is the key
area of concern in the acceptance of cloud. It is required
very high degree of privacy and authentication. In
existing system used hierarchical authorization structure
to reduce the burden and risk of a single authority .this
paper proposes a hierarchical attribute based encryption
which directly provides attribute value by user as well as
data stored in different types of media.
Keywords—Access control, attribute based encryption,
multi-authority.
I. INTRODUCTION
in cloud computing, users store their data fields in cloud
server, therefore it is very important[4] to prevent
unauthorized access to these resources. cloud computing
can provide several computing compatibilities, reduce
cost and capital expenditure and change according to
usage. The most suitable variant for fine-grained access
control in the cloud cipher text policy CP-ABE.
Attribute based encryption is a version of public key
encryption that allows users to encrypt and decrypt
messages based on user attributes. Standard encryption is
insufficient when numbers of users wants to share data
between many users [7]; since the data need to be
encrypted using every users public key. In many
situations when a user encrypts sensitive data, it is
imperative that she establish a specific access control
policy on who can decrypt this data.
The scheme can be used to ensure fine-grain access
control by the set of attributes [11] owned by the user.
Attribute based encryption can be classified into two
types:
1) Key policy ABE(KP-ABE)
2) Cipher Policy ABE (CP-ABE)
1) Key Policy ABE: The access Policies are
associated with user’s private key is generated
based on the attribute values owned by the user.
2) Cipher Policy ABE: Access Policies are assigned
with the cipher text .It is more flexible compared to
KP-ABE.CP-ABE was first introduced by Amit
Sahai and Brent Waters.
II. LITERATURE SURVEY
• Title: attribute based access control for Multi
Authority System in Cloud Storage
Author: Kan Yang, Xiaohua Jia.
In this paper, a new access control framework for multi
authority systems in cloud storage and propose an
efficient and secure multi authority access control
scheme. In designed an efficient multi authority CP-ABE
scheme that does not require a global authority and can su
support LSSS access structure. We proved that our multi-
authority CP-ABE scheme provably secure in the random
oracle model. We also proposed a new technique to solve
the attribute revocation problem in multi authority CP-
ABE scheme. We will remove the random oracle and
extend our work to be provably secure in the standard
model.
• Title: Key-Policy attribute based encryption
to secure data stored in cloud
Author: C. Vinoth, G.R. Anantha Raman
In this paper the key policy attribute based encryption
scheme, which provides more secure and fine-grained
data access control in the system. It will be efficient and
scalable to securely manage user data in the system. For
key distribution the KDC is used. It is also helpful to
secure data from the unauthorized user and auditors. The
challenging problem is the construction of KP-ABE
scheme with constant cipher text size and constant cipher
text size and private key size.
• Title: Attribute based access control
Author: Prof. N.B. Kadu, Gholap Nilesh,Saraf Shashir,
Garodi Pravin, Bora Anand
Attribute based access control provide data
confidentiality. This system solves the drawbacks of role
based access control by replacing attributes instead of
roles.
We use constant size cipher text instead of depending
linearly on numbers of attributes which helps to improve
efficiency and performance. Our scheme maintains the
size of cipher text and the computation of encryption and
decryption at constant value.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 2099
• Title: System Based access control for multi
authority system with constant size cipher
text in cloud computing.
Author: Chen Yanil, Sng Linglish, Yang Geng
In this paper we presents a CP-ABE access control for
multi authority system with constant size cipher text in
cloud computing. Both the length of cipher text and the
number of pairing operations in decryption are constant
and independent of the number of attributes involved in
the access structure, which reduce the communication and
computing cost of the system. This scheme only supports
a restricted access control structure, which is AND gates
on multiple attributes.
• Title: Attribute based access control for multi
authority system with constant size cipher
text in cloud computing
Author: CHEN Yanil, SONG Lining, YANG Geng
In this paper we presents a CP-ABE access control for
multi-authority systems with constant size cipher text in
cloud computing. Both the length of cipher text and the
number of pairing operations in decryption are constant
and independent of the number of attributes involved in
the access stricter, which reduce the communication and
computing cost of multi authorities solve the escrow
problem in the single authority system.
Title : Attribute based access control with constant
size cipher text in cloud computing
Author: Wei Teng, Geng Yang, Yang Xiang, Ting
Zhang, Dongyang Wang
Scheme sharing of data plays an important role in cloud
computing. Attribute based access control can realized
data confidentiality in the untrusted environment of server
end, fine grained access control and large scale dynamic
authorization which are difficult problems to solve the
traditional access control. This paper proposes a structure
of hierarchical attribute authority. This paper proposed a
structure of hierarchical attribute authority based on cloud
computing which reduces the burden and disperses the
risk of the single authority. The propose scheme adopts
CP-ABE with constant size cipher text that solves the
problem of the cipher text size depending linearly on the
number of attribute.
III. COMPARISON TABLE
S
r
Title Author Meth
od
Used
Drawbacks
1 attribute
based
access
control
for Multi
Authorit
y System
in Cloud
Storage
Kan
Yang,
Xiaohua
Jia.
Globa
l UID
Random selection
attributes not
supported to
oracle
2 Key-
Policy
attribute
based
encryptio
n to
secure
data
stored in
cloud
C.
Vinoth,
G.R.
Anantha
Raman
Proxy
reencr
yption
protoc
ol
used
It required TPA
permission code
3 Attribute
based
access
control
Prof.
N.B.
Kadu,
Gholap
Nilesh,Sa
raf
Shashir,
Sarodi
Pravin,B
ora
Anand
Level
Doma
in
Autho
rity
Can not transfer
secure transfer
file such as
pdf,img,mp3,vide
o
4 Attribute
based
access
control
for multi
authority
system
with
constant
size
cipher
text
Chen
Yanil,
Sng
Linglish,
Yang
Geng
q-
BDH
E
It only support
restricted access
structure
5 Attribute
based
access
control
Wei
Teng,
Geng
Yang,
Hierar
chical
metho
It required more
secure
parameters..
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 2100
with
constant
size
cipher
text in
cloud
computin
g
Yang
Xiang,
Ting
Zhang,
Dongyan
g Wang
d
IV. CONCLUSION
In this paper we have studied many different techniques
for how secure data in cloud computing. Existing
methods having many drawbacks and limitations for
attribute size for future work .we can use better algorithm
to reduce burden of server and give fast throughput to the
user.
ACKNOWLEDGMENT
We would like to thanks to our guide & respected
teachers for their constant support and motivation for us.
Our sincere thanks to SKN Sinhgad Institute of
Technology and Science to develop our skill and
capabilities.
REFERENCES
[1] Attribute based access control with constant size
cipher text in cloud computing.
[2] Data management with attribute based encryption
method for sensitive users in cloud computing.
Vidyasagar Tella,L.V Ramesh.IJETR ISSN:2321-
0869,vol-2,issue-9,September 2014
[3] Attribute based encryption Optimal for cloud
computing(Mate Harvath) jan-5-2015
[4] Attribute based access control (Prof. N.B. Kadu
,Gholap Nilesh, Saraf Shashir, Garodi Pravin ,Bora
Anand. IJARIIE-ISSN(0)-2395-4396vol-2,issue-2
2016
[5] Cipher Policy Hierarchical Attribute based
encryption with short cipher text : Efficiently
sharing data among large organizations.Hua Deng,
Quanhong Wu,
[6] A Literature Survey on key aggregation system for
secure sharing of cloud data. Arun Kumar S., S.
Dhansekar IJARECE ,vlo-3, issue-(12 ,December
2014)
[7] An Efficient Presentation of Attribute Based
Encryption Design in cloud data. ISSN:2277 128X,
vol-5,issue-(2 Feb 2015)
[8] A survey on Attribute based encryption Scheme of
Access control in cloud environment .IJNS, vol-15,
no-4,pp.231-240,(July 2013)
[9] Attribute Based Access Control for Multi Authority
System in cloud storage.32nd
IEEE International
conference on Distributed computing systems
(2012)
[10]Attribute Based Access Control for multi Authority
System with Constant size Ciphertext in cloud
computing. China communucations(Feb 2016)
[11]Constant Size Ciphertext Attribute Based
Encryption with Lively membership .Saranya P. P.
Alphonsa Kurioakose(11 November 2015)
[12]Attribute Based Encryption schemes with Constant
size Cipher texts(2010)
[13]Key-Policy attribute Based Encryption to Secure
data stored in cloud IJATES vol-2,issue no-
1,(September 2014)
[14]Enhancement of Cloud Computing Security with
secure data storage using AES.IJIRST , vol-2, issue-
09,February 2016.
[15]Cryptographic protocols for secure cloud
computing.IJSIA, vol-10,no-2,pp:301-310(2016)

Más contenido relacionado

La actualidad más candente

Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...
IJECEIAES
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
 

La actualidad más candente (20)

Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
J018145862
J018145862J018145862
J018145862
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
H1803035056
H1803035056H1803035056
H1803035056
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...
 

Destacado

implementing training and skills investment policy for effective performance ...
implementing training and skills investment policy for effective performance ...implementing training and skills investment policy for effective performance ...
implementing training and skills investment policy for effective performance ...
INFOGAIN PUBLICATION
 
Ahmed-Hamdy-CV2016
Ahmed-Hamdy-CV2016Ahmed-Hamdy-CV2016
Ahmed-Hamdy-CV2016
Ahmed Hamdy
 
Eng. Essam Ahmed CV
Eng. Essam Ahmed CV Eng. Essam Ahmed CV
Eng. Essam Ahmed CV
Essam Ahmed
 
Adnan -updated CV
Adnan -updated CVAdnan -updated CV
Adnan -updated CV
Adnan TV
 
Edwin Suryadi, Internship CV, Resume, Coverletter
Edwin Suryadi, Internship CV, Resume, CoverletterEdwin Suryadi, Internship CV, Resume, Coverletter
Edwin Suryadi, Internship CV, Resume, Coverletter
Edwin Suryadi
 

Destacado (19)

an experiment on a co2 air conditioning system with copper heat exchangers
an experiment on a co2 air conditioning system with copper heat exchangersan experiment on a co2 air conditioning system with copper heat exchangers
an experiment on a co2 air conditioning system with copper heat exchangers
 
development of high speed gas gun with a new trigger system
development of high speed gas gun with a new trigger systemdevelopment of high speed gas gun with a new trigger system
development of high speed gas gun with a new trigger system
 
Lean supply chain management
Lean supply chain managementLean supply chain management
Lean supply chain management
 
development of a novel keyboard interface unit for writing quran using computer
development of a novel keyboard interface unit for writing quran using computerdevelopment of a novel keyboard interface unit for writing quran using computer
development of a novel keyboard interface unit for writing quran using computer
 
implementing training and skills investment policy for effective performance ...
implementing training and skills investment policy for effective performance ...implementing training and skills investment policy for effective performance ...
implementing training and skills investment policy for effective performance ...
 
osmotic dehydration as a tool for insdustrialization of jabuticaba peel (myrc...
osmotic dehydration as a tool for insdustrialization of jabuticaba peel (myrc...osmotic dehydration as a tool for insdustrialization of jabuticaba peel (myrc...
osmotic dehydration as a tool for insdustrialization of jabuticaba peel (myrc...
 
нарийн гэдсэнд хоол боловсрох
нарийн гэдсэнд хоол боловсрохнарийн гэдсэнд хоол боловсрох
нарийн гэдсэнд хоол боловсрох
 
my cv upto 2015 june
my cv upto 2015 junemy cv upto 2015 june
my cv upto 2015 june
 
Ahmed-Hamdy-CV2016
Ahmed-Hamdy-CV2016Ahmed-Hamdy-CV2016
Ahmed-Hamdy-CV2016
 
identifying malevolent facebook requests
identifying malevolent facebook requestsidentifying malevolent facebook requests
identifying malevolent facebook requests
 
P&g
P&gP&g
P&g
 
Eng. Essam Ahmed CV
Eng. Essam Ahmed CV Eng. Essam Ahmed CV
Eng. Essam Ahmed CV
 
打造精彩人生的十組關鍵字 by 傑克飛
打造精彩人生的十組關鍵字 by 傑克飛打造精彩人生的十組關鍵字 by 傑克飛
打造精彩人生的十組關鍵字 by 傑克飛
 
Food safety and quality management regulatory systems in afghanistan 2016
Food safety and quality management regulatory systems in afghanistan   2016Food safety and quality management regulatory systems in afghanistan   2016
Food safety and quality management regulatory systems in afghanistan 2016
 
Adnan -updated CV
Adnan -updated CVAdnan -updated CV
Adnan -updated CV
 
Msc. synopsis OAT Genetic diversity and molecular markers
Msc. synopsis OAT Genetic diversity and molecular markersMsc. synopsis OAT Genetic diversity and molecular markers
Msc. synopsis OAT Genetic diversity and molecular markers
 
Its for big hindi film released @cinema industry – cinema hall with film to ...
Its for big hindi film released @cinema industry – cinema hall with  film to ...Its for big hindi film released @cinema industry – cinema hall with  film to ...
Its for big hindi film released @cinema industry – cinema hall with film to ...
 
Edwin Suryadi, Internship CV, Resume, Coverletter
Edwin Suryadi, Internship CV, Resume, CoverletterEdwin Suryadi, Internship CV, Resume, Coverletter
Edwin Suryadi, Internship CV, Resume, Coverletter
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 

Similar a survey paper on cp abe cloud computing

A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
ijsrd.com
 
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud ComputingAn Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
ijtsrd
 

Similar a survey paper on cp abe cloud computing (20)

A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
C04932125
C04932125C04932125
C04932125
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
Ijcatr04051007
Ijcatr04051007Ijcatr04051007
Ijcatr04051007
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud ComputingAn Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 

Último

Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Último (20)

Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 

survey paper on cp abe cloud computing

  • 1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 2098 Survey Paper on CP-ABE cloud computing Poornima G. Pawar, Prof. V. D. Thombre Department of Computer Engineering, Savitribai Phule,Pune University SKN Institute of Technology & Science, Lonavala, Pune Maharashtra India Abstract— In attribute based encryption (ABE) scheme, attributes plays a very important role. Attribute –based encryption provides privacy protection for the users by a set of attributes. Now a days as cloud is most widely used in mostly all fields so there is need of keeping data more secure and confidential which is outsourced on the cloud. Security of the data in cloud database server is the key area of concern in the acceptance of cloud. It is required very high degree of privacy and authentication. In existing system used hierarchical authorization structure to reduce the burden and risk of a single authority .this paper proposes a hierarchical attribute based encryption which directly provides attribute value by user as well as data stored in different types of media. Keywords—Access control, attribute based encryption, multi-authority. I. INTRODUCTION in cloud computing, users store their data fields in cloud server, therefore it is very important[4] to prevent unauthorized access to these resources. cloud computing can provide several computing compatibilities, reduce cost and capital expenditure and change according to usage. The most suitable variant for fine-grained access control in the cloud cipher text policy CP-ABE. Attribute based encryption is a version of public key encryption that allows users to encrypt and decrypt messages based on user attributes. Standard encryption is insufficient when numbers of users wants to share data between many users [7]; since the data need to be encrypted using every users public key. In many situations when a user encrypts sensitive data, it is imperative that she establish a specific access control policy on who can decrypt this data. The scheme can be used to ensure fine-grain access control by the set of attributes [11] owned by the user. Attribute based encryption can be classified into two types: 1) Key policy ABE(KP-ABE) 2) Cipher Policy ABE (CP-ABE) 1) Key Policy ABE: The access Policies are associated with user’s private key is generated based on the attribute values owned by the user. 2) Cipher Policy ABE: Access Policies are assigned with the cipher text .It is more flexible compared to KP-ABE.CP-ABE was first introduced by Amit Sahai and Brent Waters. II. LITERATURE SURVEY • Title: attribute based access control for Multi Authority System in Cloud Storage Author: Kan Yang, Xiaohua Jia. In this paper, a new access control framework for multi authority systems in cloud storage and propose an efficient and secure multi authority access control scheme. In designed an efficient multi authority CP-ABE scheme that does not require a global authority and can su support LSSS access structure. We proved that our multi- authority CP-ABE scheme provably secure in the random oracle model. We also proposed a new technique to solve the attribute revocation problem in multi authority CP- ABE scheme. We will remove the random oracle and extend our work to be provably secure in the standard model. • Title: Key-Policy attribute based encryption to secure data stored in cloud Author: C. Vinoth, G.R. Anantha Raman In this paper the key policy attribute based encryption scheme, which provides more secure and fine-grained data access control in the system. It will be efficient and scalable to securely manage user data in the system. For key distribution the KDC is used. It is also helpful to secure data from the unauthorized user and auditors. The challenging problem is the construction of KP-ABE scheme with constant cipher text size and constant cipher text size and private key size. • Title: Attribute based access control Author: Prof. N.B. Kadu, Gholap Nilesh,Saraf Shashir, Garodi Pravin, Bora Anand Attribute based access control provide data confidentiality. This system solves the drawbacks of role based access control by replacing attributes instead of roles. We use constant size cipher text instead of depending linearly on numbers of attributes which helps to improve efficiency and performance. Our scheme maintains the size of cipher text and the computation of encryption and decryption at constant value.
  • 2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 2099 • Title: System Based access control for multi authority system with constant size cipher text in cloud computing. Author: Chen Yanil, Sng Linglish, Yang Geng In this paper we presents a CP-ABE access control for multi authority system with constant size cipher text in cloud computing. Both the length of cipher text and the number of pairing operations in decryption are constant and independent of the number of attributes involved in the access structure, which reduce the communication and computing cost of the system. This scheme only supports a restricted access control structure, which is AND gates on multiple attributes. • Title: Attribute based access control for multi authority system with constant size cipher text in cloud computing Author: CHEN Yanil, SONG Lining, YANG Geng In this paper we presents a CP-ABE access control for multi-authority systems with constant size cipher text in cloud computing. Both the length of cipher text and the number of pairing operations in decryption are constant and independent of the number of attributes involved in the access stricter, which reduce the communication and computing cost of multi authorities solve the escrow problem in the single authority system. Title : Attribute based access control with constant size cipher text in cloud computing Author: Wei Teng, Geng Yang, Yang Xiang, Ting Zhang, Dongyang Wang Scheme sharing of data plays an important role in cloud computing. Attribute based access control can realized data confidentiality in the untrusted environment of server end, fine grained access control and large scale dynamic authorization which are difficult problems to solve the traditional access control. This paper proposes a structure of hierarchical attribute authority. This paper proposed a structure of hierarchical attribute authority based on cloud computing which reduces the burden and disperses the risk of the single authority. The propose scheme adopts CP-ABE with constant size cipher text that solves the problem of the cipher text size depending linearly on the number of attribute. III. COMPARISON TABLE S r Title Author Meth od Used Drawbacks 1 attribute based access control for Multi Authorit y System in Cloud Storage Kan Yang, Xiaohua Jia. Globa l UID Random selection attributes not supported to oracle 2 Key- Policy attribute based encryptio n to secure data stored in cloud C. Vinoth, G.R. Anantha Raman Proxy reencr yption protoc ol used It required TPA permission code 3 Attribute based access control Prof. N.B. Kadu, Gholap Nilesh,Sa raf Shashir, Sarodi Pravin,B ora Anand Level Doma in Autho rity Can not transfer secure transfer file such as pdf,img,mp3,vide o 4 Attribute based access control for multi authority system with constant size cipher text Chen Yanil, Sng Linglish, Yang Geng q- BDH E It only support restricted access structure 5 Attribute based access control Wei Teng, Geng Yang, Hierar chical metho It required more secure parameters..
  • 3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 2100 with constant size cipher text in cloud computin g Yang Xiang, Ting Zhang, Dongyan g Wang d IV. CONCLUSION In this paper we have studied many different techniques for how secure data in cloud computing. Existing methods having many drawbacks and limitations for attribute size for future work .we can use better algorithm to reduce burden of server and give fast throughput to the user. ACKNOWLEDGMENT We would like to thanks to our guide & respected teachers for their constant support and motivation for us. Our sincere thanks to SKN Sinhgad Institute of Technology and Science to develop our skill and capabilities. REFERENCES [1] Attribute based access control with constant size cipher text in cloud computing. [2] Data management with attribute based encryption method for sensitive users in cloud computing. Vidyasagar Tella,L.V Ramesh.IJETR ISSN:2321- 0869,vol-2,issue-9,September 2014 [3] Attribute based encryption Optimal for cloud computing(Mate Harvath) jan-5-2015 [4] Attribute based access control (Prof. N.B. Kadu ,Gholap Nilesh, Saraf Shashir, Garodi Pravin ,Bora Anand. IJARIIE-ISSN(0)-2395-4396vol-2,issue-2 2016 [5] Cipher Policy Hierarchical Attribute based encryption with short cipher text : Efficiently sharing data among large organizations.Hua Deng, Quanhong Wu, [6] A Literature Survey on key aggregation system for secure sharing of cloud data. Arun Kumar S., S. Dhansekar IJARECE ,vlo-3, issue-(12 ,December 2014) [7] An Efficient Presentation of Attribute Based Encryption Design in cloud data. ISSN:2277 128X, vol-5,issue-(2 Feb 2015) [8] A survey on Attribute based encryption Scheme of Access control in cloud environment .IJNS, vol-15, no-4,pp.231-240,(July 2013) [9] Attribute Based Access Control for Multi Authority System in cloud storage.32nd IEEE International conference on Distributed computing systems (2012) [10]Attribute Based Access Control for multi Authority System with Constant size Ciphertext in cloud computing. China communucations(Feb 2016) [11]Constant Size Ciphertext Attribute Based Encryption with Lively membership .Saranya P. P. Alphonsa Kurioakose(11 November 2015) [12]Attribute Based Encryption schemes with Constant size Cipher texts(2010) [13]Key-Policy attribute Based Encryption to Secure data stored in cloud IJATES vol-2,issue no- 1,(September 2014) [14]Enhancement of Cloud Computing Security with secure data storage using AES.IJIRST , vol-2, issue- 09,February 2016. [15]Cryptographic protocols for secure cloud computing.IJSIA, vol-10,no-2,pp:301-310(2016)