SlideShare a Scribd company logo
Enviar búsqueda
Cargar
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encryption Scheme in Cloud Computing
Denunciar
Compartir
IRJET Journal
Fast Track Publications
Seguir
•
1 recomendación
•
62 vistas
Ingeniería
https://www.irjet.net/archives/V5/i4/IRJET-V5I4252.pdf
Leer más
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encryption Scheme in Cloud Computing
•
1 recomendación
•
62 vistas
IRJET Journal
Fast Track Publications
Seguir
Denunciar
Compartir
Ingeniería
https://www.irjet.net/archives/V5/i4/IRJET-V5I4252.pdf
Leer más
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encryption Scheme in Cloud Computing
1 de 5
Descargar ahora
Recomendados
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
35 vistas
•
6 diapositivas
IJSRED-V2I3P52 por
IJSRED-V2I3P52
IJSRED
14 vistas
•
4 diapositivas
H1803035056 por
H1803035056
IOSR Journals
149 vistas
•
7 diapositivas
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN... por
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
67 vistas
•
15 diapositivas
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems por
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
10 vistas
•
4 diapositivas
IRJET- Secure Cloud Data Using Attribute Based Encryption por
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
20 vistas
•
5 diapositivas
Más contenido relacionado
La actualidad más candente
Secure Data Sharing In an Untrusted Cloud por
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
294 vistas
•
6 diapositivas
Enhanced security framework to ensure data security por
Enhanced security framework to ensure data security
eSAT Publishing House
367 vistas
•
5 diapositivas
A Novel Information Accountability Framework for Cloud Computing por
A Novel Information Accountability Framework for Cloud Computing
IJMER
289 vistas
•
3 diapositivas
Cloud Data Security using Elliptic Curve Cryptography por
Cloud Data Security using Elliptic Curve Cryptography
IRJET Journal
101 vistas
•
5 diapositivas
Efficient technique for privacy preserving publishing of set valued data on c... por
Efficient technique for privacy preserving publishing of set valued data on c...
ElavarasaN GanesaN
37 vistas
•
9 diapositivas
IRJET- Securing Cloud Data Under Key Exposure por
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
203 vistas
•
5 diapositivas
La actualidad más candente
(20)
Secure Data Sharing In an Untrusted Cloud por IJERA Editor
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
•
294 vistas
Enhanced security framework to ensure data security por eSAT Publishing House
Enhanced security framework to ensure data security
eSAT Publishing House
•
367 vistas
A Novel Information Accountability Framework for Cloud Computing por IJMER
A Novel Information Accountability Framework for Cloud Computing
IJMER
•
289 vistas
Cloud Data Security using Elliptic Curve Cryptography por IRJET Journal
Cloud Data Security using Elliptic Curve Cryptography
IRJET Journal
•
101 vistas
Efficient technique for privacy preserving publishing of set valued data on c... por ElavarasaN GanesaN
Efficient technique for privacy preserving publishing of set valued data on c...
ElavarasaN GanesaN
•
37 vistas
IRJET- Securing Cloud Data Under Key Exposure por IRJET Journal
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
•
203 vistas
IRJET- Adaptable Wildcard Searchable Encryption System por IRJET Journal
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET Journal
•
11 vistas
Preserving Privacy Policy- Preserving public auditing for data in the cloud por inventionjournals
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals
•
266 vistas
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ... por IRJET Journal
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
•
35 vistas
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC por IRJET Journal
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
•
25 vistas
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms por IRJET Journal
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
•
15 vistas
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat... por IRJET Journal
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
•
43 vistas
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S... por IRJET Journal
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET Journal
•
72 vistas
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ... por IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
•
10 vistas
R180203114117 por IOSR Journals
R180203114117
IOSR Journals
•
224 vistas
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co... por IJERA Editor
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
IJERA Editor
•
32 vistas
J018145862 por IOSR Journals
J018145862
IOSR Journals
•
145 vistas
Cloud Auditing With Zero Knowledge Privacy por IJERA Editor
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
•
172 vistas
A Secure & Scalable Access Method in Cloud Computing por ijsrd.com
A Secure & Scalable Access Method in Cloud Computing
ijsrd.com
•
327 vistas
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC... por IJCNCJournal
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
•
60 vistas
Similar a IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encryption Scheme in Cloud Computing
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC por
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
36 vistas
•
3 diapositivas
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C... por
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
44 vistas
•
4 diapositivas
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing por
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
19 vistas
•
4 diapositivas
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing por
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
59 vistas
•
3 diapositivas
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in... por
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
29 vistas
•
4 diapositivas
IRJET- Secure Data Protection in Cloud Computing por
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
12 vistas
•
4 diapositivas
Similar a IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encryption Scheme in Cloud Computing
(20)
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC por IRJET Journal
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
•
36 vistas
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C... por IRJET Journal
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
•
44 vistas
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing por IRJET Journal
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
•
19 vistas
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing por IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
•
59 vistas
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in... por IRJET Journal
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
•
29 vistas
IRJET- Secure Data Protection in Cloud Computing por IRJET Journal
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
•
12 vistas
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co... por IRJET Journal
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
•
130 vistas
System Approach for Single Keyword Search for Encrypted Data Files Guarantees... por IRJET Journal
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET Journal
•
34 vistas
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic... por Editor IJCATR
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
•
524 vistas
Achieving Secure, sclable and finegrained Cloud computing report por Kiran Girase
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
•
489 vistas
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i... por IRJET Journal
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
•
103 vistas
Two Aspect Validation Control Frameworks for Online Distributed Services por IRJET Journal
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
•
35 vistas
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag... por IRJET Journal
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
•
9 vistas
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey por IRJET Journal
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
•
49 vistas
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage por IRJET Journal
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
•
30 vistas
Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S... por IJCSIS Research Publications
Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...
IJCSIS Research Publications
•
30 vistas
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM por IRJET Journal
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET Journal
•
11 vistas
Secure Data Self-Destructing with Time Constraint in Clouds por IRJET Journal
Secure Data Self-Destructing with Time Constraint in Clouds
IRJET Journal
•
34 vistas
A robust and verifiable threshold multi authority access control system in pu... por IJARIIT
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
•
33 vistas
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage por IRJET Journal
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
•
46 vistas
Más de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
25 vistas
•
7 diapositivas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
8 vistas
•
7 diapositivas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
8 vistas
•
5 diapositivas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
13 vistas
•
11 diapositivas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 vistas
•
6 diapositivas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 vistas
•
5 diapositivas
Más de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
25 vistas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
8 vistas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
8 vistas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
13 vistas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 vistas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 vistas
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 vistas
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 vistas
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 vistas
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 vistas
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 vistas
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
62 vistas
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
12 vistas
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 vistas
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
5 vistas
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AI
IRJET Journal
•
12 vistas
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 vistas
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 vistas
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
5 vistas
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 vistas
Último
Pitchbook Repowerlab.pdf por
Pitchbook Repowerlab.pdf
VictoriaGaleano
6 vistas
•
12 diapositivas
Créativité dans le design mécanique à l’aide de l’optimisation topologique por
Créativité dans le design mécanique à l’aide de l’optimisation topologique
LIEGE CREATIVE
8 vistas
•
84 diapositivas
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78
180 vistas
•
19 diapositivas
Robotics in construction enterprise por
Robotics in construction enterprise
Khalid Abdel Naser Abdel Rahim
5 vistas
•
1 diapositiva
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn
8 vistas
•
210 diapositivas
Global airborne satcom market report por
Global airborne satcom market report
defencereport78
6 vistas
•
13 diapositivas
Último
(20)
Pitchbook Repowerlab.pdf por VictoriaGaleano
Pitchbook Repowerlab.pdf
VictoriaGaleano
•
6 vistas
Créativité dans le design mécanique à l’aide de l’optimisation topologique por LIEGE CREATIVE
Créativité dans le design mécanique à l’aide de l’optimisation topologique
LIEGE CREATIVE
•
8 vistas
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78
•
180 vistas
Robotics in construction enterprise por Khalid Abdel Naser Abdel Rahim
Robotics in construction enterprise
Khalid Abdel Naser Abdel Rahim
•
5 vistas
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn
•
8 vistas
Global airborne satcom market report por defencereport78
Global airborne satcom market report
defencereport78
•
6 vistas
dummy.pptx por JamesLamp
dummy.pptx
JamesLamp
•
5 vistas
Ansari: Practical experiences with an LLM-based Islamic Assistant por M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous
•
9 vistas
START Newsletter 3 por Start Project
START Newsletter 3
Start Project
•
7 vistas
REACTJS.pdf por ArthyR3
REACTJS.pdf
ArthyR3
•
37 vistas
Searching in Data Structure por raghavbirla63
Searching in Data Structure
raghavbirla63
•
17 vistas
MK__Cert.pdf por Hassan Khan
MK__Cert.pdf
Hassan Khan
•
19 vistas
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf por AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure
•
8 vistas
Plant Design Report-Oil Refinery.pdf por Safeen Yaseen Ja'far
Plant Design Report-Oil Refinery.pdf
Safeen Yaseen Ja'far
•
7 vistas
MongoDB.pdf por ArthyR3
MongoDB.pdf
ArthyR3
•
49 vistas
Renewal Projects in Seismic Construction por Engineering & Seismic Construction
Renewal Projects in Seismic Construction
Engineering & Seismic Construction
•
5 vistas
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptx
gopinathcreddy
•
37 vistas
Web Dev Session 1.pptx por VedVekhande
Web Dev Session 1.pptx
VedVekhande
•
17 vistas
DESIGN OF SPRINGS-UNIT4.pptx por gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
•
21 vistas
SUMIT SQL PROJECT SUPERSTORE 1.pptx por Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav
•
22 vistas
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encryption Scheme in Cloud Computing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1139 A Review Paper on an Efficient File Hierarchy Attribute Based Encryption Scheme in Cloud Computing Shital Panchal1, Kamthane A.N.2, Shital Gaikwad3 1P.G. Student, Dept. of Computer Science & Engineering, MPGI School of Engineering, Nanded, Maharashtra, India 2HOD, Dept. of Computer Science & Engineering, MPGI School of Engineering, Nanded, Maharashtra, India 3Assistant Prof., Dept. of Computer Science & Engineering, MPGI School of Engineering, Nanded, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing enables the users to remotely store their data in a server and provide services on-demand. Cloud storage is the best way to handle our information securely. Data security and privacy are the critical issues. There are many encryption technologies used to share data securely. One of the best ways is CP-ABE is to solve challenging problem of secure data sharing scheme in cloud computing. Only authorized users are able to encrypt and decrypt data. Each user has the set of attributes. The layered access structure are integrated into single access structure .The hierarchical files are encrypted with integrated access structure. Ciphertext time cost of encryption is saved. Final Implementation gives that linearly increasing the encryption and decryption time as number of attributes are increased. In this paper an efficient file hierarchy attribute based encryption scheme is proposed. Key Words: Cloud Computing,datasharing,filehierarchy ciphertext-policy, attribute based encryption 1. INTRODUCTION Cloud Computing can be described as web service oriented computing that provides an environment which acts as a service in delivering software and informationmanagement in a way that would have typically only been available in product format. This is donethroughpersonal devices – such as a laptop – that would access the services available through the network of servers that is called the “cloud”. 1.1 Overview Cloud Computing is the use of hardware and software to deliver aservice over a network (typically the Internet)....An example of a Cloud Computing provider is Google’s Gmail. Gmail users can access files and applications hosted by Google via the internet from any device. Cloud Computing is to protect data fromleaking, users need to encrypt their data before shared. Cloud computing posesprivacyconcerns becausetheservice provider can access the data that is in the cloud at any time. It could accidentally or deliberately alter or even delete information. Many cloud providers can share information with third parties if necessary for purposes of law and order even without a warrant. That is permitted in their privacy policies, which users must agree to before they start using cloud services. Solutions to privacy include policy and legislation as well as end users’ choices for how data is stored. Users can encrypt data that is processed or stored within the cloud to prevent unauthorized access[1]. Role based authentication is a combinationofsymmetrickey cryptography and public key cryptography where by every encryption process needs data, public key, groupkey,policy. a policy is a set of rule that can be specified as chain also for e.g., in the context of hospital a policy can be given as {doctor, patient} which means anybody from the doctors group or patient group can simultaneously decrypt the document on the other hand a policy can be specified as chain policy for instance{doctor},{patient} this is known as nested policy .In such cases a patient can decrypt the document only when that is decrypted by doctors first, Policy based encryption is becoming popular in an enterprise context where different authorities require different permission and privacy settings for the access of the records. In this work we want to develop a novel CP- ABE[2] based search technique in an enterprise hospital context deployed in a local cloud with fog computing architecture ,our proposedsystemwill offerdifferentlevel of encryption, decryption, authentication, authorization and privacy setting for doctors, administrators and patients .we also propose to use a machine learning base system to diagnose abnormality in the medical image. In this work we demonstrate the use of CP-ABE with human entities as well as i n the context of machine learning the overall work demonstrate the entire process of medical scanning in an enterprise hospital application both plain record encryption and image encryption with the help of CP-ABE. Problem definition: CP-ABE is derived from AES and it is extremely complicated mathematically, CP-ABE encryption not only encrypts the data with a key but at the same time embeds the access policy, because access policy can be changed, the overall decryption process is also extremely complicated, therefore one of the major issue. Issues: 1. Access Policy Management: Implementing CP-ABE based system is, the design issue of appropriate forming the group, generating the group keys and managing the access policies.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1140 2. Attack Prevention: As CP-ABE scheme to decrypt the key, one of major issues with the system is that anybody acquiring a group key, a drawback can overcome by incorporating the private key also in the decryption process not only decryption authority require the group key but at the same time it on private key. 3. As our proposed work implement CP-ABE based encryption both record as well as with the images, the decryption and encryption of such a system using on hybrid records become a huge issue. 4. Bandwidth and latency Management: As medical data is sensitive and requires a faster processing and because CP-ABE based encryptionaddshugeprocessing overhead ,a huge issue in such system is to develop systems with optimal processing and communication latency. Challenges: 1. The major challenge with CP-ABE based encryption is creating mathematical model of encryptiononthetopofAES encryption schema that supports changed privacy. Simple form of CP-ABE encryption allows the user to specify the access policies as the simple set{doctor ,patient},however more complicated CP-ABE architecture allows the user to embed a complex set of policies where by policy itself can be nested designing and implementation of such a system and maintaining the integrity of the policy chain is extremely difficult. 2. Handling Media Data: As most of the hospital or enterprise application not only deals with text data ,but also other forms of data like images, developing an algorithm that holds goodforbothtextaswell as image(binary record) is of extremely challenging serve. 3.Data Size: Because CP-ABE is developed on the top of AES which is block encryption technique, it accepts the data to multiplier of block size. However in most cases the record will not be multiplier of the block size, padding of the data at thetime of encryption and removal of padding is the challenging task. 2. LITERATURE SURVEY The literature survey that containing study of different schemes available in Attribute Based encryption(ABE). An efficient file hierarchy attribute-based encryption scheme (FH-CP-ABE) is proposed by Shulan Wang, JunweiZhou, Joseph K. Liu, Jianping Yu, Jianyong Chen and WeixinXie.The layered access structures are integrated into a single access structure, and then the hierarchical files are encrypted with the integrated access structure. The cipher text components related to attributes could be shared by the files. Therefore, both cipher text storage and time costs of encryption are saved. Moreover, the proposed scheme is proved to be secure under the standard assumption. In this study, an efficient encryption scheme based on layered model of the access structure is proposed in cloud computing, which is named file hierarchy CP-ABE scheme (or FH-CP-ABE, for short). FH-CP-ABE extendstypical CPABEwitha hierarchical structure of access policy, so as to achieve simple, flexible and fine-grained access control. 2.1 Attribute Based Encryption An attribute based encryption scheme introduced by Sahai and Waters in 2005 and the goal is to provide security and access control. Attribute-based encryption(ABE)isa public- key based one to many encryption that allows users to encrypt and decrypt data based on user attributes. In which the secret key of a user and the cipher text are dependent upon attributes (e.g. the country she lives, or the kind of subscription she has). In such a system, the decryption of a cipher text is possible only if the set of attributes of the user key matches the attributes of the cipher text. Decryption is only possible when the number of matching is at least a threshold value d. Collusion-resistance is crucial security feature of Attribute-Based Encryption [3]-[5]. An adversary that holds multiple keys should only be able to access data if at least one individual key grants access. The problem with attribute based encryption (ABE) scheme is that data owner needs to use every authorized user's public key to encrypt data. The application of this scheme is restricted in the real environment because it uses the access of monotonic attributes to control user's access in the system. 2.2 Key Policy Attribute Based Encryption It is the modified form of classical model of ABE. Users are assigned with an access tree structure over the data attributes. Threshold gates are the nodes of the access tree. The attributes are associated by leaf nodes. To reflect the access tree Structure the secret key of the user is defined. Cipher texts are labeled with sets of attributes and private keys are associated with monotonic access structures that control which cipher texts a user is able to decrypt. Key Policy Attribute Based Encryption (KP-ABE) scheme[6] is designed for one-to-many communications. KP-ABE scheme consists of the following four algorithms: Setup : Algorithm takes input K as a securityparameter and returns PK as public key and a system master secret key MK.PK is used by message senders for encryption. MK is used to generate user secret keys and is known only to the authority. Encryption :Algorithmtakesa messageM,thepublickey PK, and a set of attributes as input. It outputs the ciphertext E. Key Generation: Algorithm takes as input an access structure T and the master secret key MK. It outputs a secret key SK that enables the user to decrypt a message encrypted under a set of attributes if and only if matches T.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1141 Decryption : It takes as input the user’s secret key SK for access structure T and theciphertextE,whichwasencrypted under the attribute set . This algorithm outputs the message M if and only if the attribute set satisfies the user’s access structure T. Limitations of KP-ABE:- 1. Encryptor cannot decide who candecrypttheencrypted data. It can only choose descriptive attributes for the data, and has no choice but to trust the key issuer. KPABE is not naturally suitable to certain applications. For example, sophisticated broadcast encryptionwhere users are described by various attributes andinthis,the one whose attributes match a policy associated with a ciphertext, it can decrypttheciphertext.KP-ABEscheme supports user secret key accountability. It is providing fine grained access but has no longer with flexibilityand scalability. 2. Expressive Key Policy Attribute Based Encryption:- In KP-ABE, enables senders to encrypt messageswitha set of attributes and private keys are associatedwithaccess tree structure. Access tree structure specifies which all the ciphertexts the key holder is allowed to decrypt. Expressive key-policy attribute-based encryption (KPABE) schemes allow for non-monotonic access structures. Non monotonic access tree structures are those may contain negated attributes and with constant cipher-text size. This is more efficient than KP-ABE. 2.3 Ciphertext policy attribute based encryption It introduced the concept of another modified form of ABE called CP-ABE that is Ciphertext Policy Attribute Based Encryption. In CP-ABE scheme, attribute policies are associated with data and attributes are associated withkeys and only those keys that the associated attributes satisfythe policy associated with the data are able to decrypt the data. CP-ABE works in the reverse way of KP-ABE. In CP-ABE the ciphertext is associated with an access tree structure and each user secret key is embedded with a set of attributes. In ABE, including KP-ABE and CP-ABE, the authority runs the algorithm Setup and Key Generation to generate systemMK, PK, and user secret keys. Only authorized users (i.e., users with intended access structures) are able to decrypt by calling the algorithm Decryption. In CP-ABE, each user is associated with a set of attributes. His secret key is generated based on his attributes. While encrypting a message, the encryptor specifies the threshold access structure for his interested attributes. This message is then encrypted based on this access structure such that only those whose attributes satisfy the access structure can decrypt it. With CP ABE technique, encrypted data can be kept confidential and secure against collusion attacks. CP-ABE scheme consists of following four algorithms: 1. Setup : This algorithm takes as input a securityparameter κ and returns the public key PK as well as a system master secret key MK. PK is used by message senders for encryption. MK is used to generate user secret keys and is known only to the authority. 2.Encrypt : This algorithm takes as input the public parameter PK, a message M, and an access structure T. It outputs the ciphertext CT. 3.Key-Gen : This algorithm takes as input a set of attributes associated with the user and the master secret key MK. It outputs a secret key SK that enables the user to decrypt a message encrypted under an access tree structure T if and only if matches T. 4.Decrypt : This algorithm takes as input the ciphertext CT and a secret key SK for an attributes set . It returns the message M if and only if satisfies the access structure associated with the ciphertext CT. In CP-ABE depends how attributes and policy are associated with cipher texts and users‟ decryption keys. In a CP-ABE scheme, a ciphertext is associated with a monotonic tree access structure and a user’s decryption key is associated with set of attributes. In this scheme, the roles of ciphertexts and decryptionkeysare switched as that in KP-ABE. Limitations of CP-ABE:- However, basic CP-ABE schemes are still not fulfilling the enterprise requirements of access control which require considerable flexibility and efficiency. CP-ABE has limitations in specifying policies and managing user attributes. In a CP-ABE scheme, decryption keys only support user attributes that are organized logically as a single set, so users can only use all possible combinations of attributes in a single set issued in their keys to satisfy policies. For realizing complex access control on encrypted data and maintaining confidential-ability, CP-ABE can be used. Encrypted data can be kept confidential even if the storage server is un-trusted; moreover, our methods are secure againstcollusionattacks[7].KP-ABEusesattributesto describe the encrypted data and built policies into user’s keys. In other hand CP-ABE, attributes are used todescribea user’s credentials. Data encryptor determines a policy for who can decrypt. 3. DESIGN GOALS
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1142 Authority-accepts the user enrollment and creates some parameters. Cloud service provider (CSP) -is the manager of cloud servers and provides multiple services for client. Data owner -encrypts anduploadsthegeneratedciphertext to CSP. It has large data needed to be stored and shared in cloud system. User -downloads and decrypts the interested cipher text from CSP. The shared files usuallyhavehierarchical structure.Thatis,a group of files are divided into a number of hierarchy subgroups located at different access levels. If the filesin the same hierarchical structure could be encrypted by an integrated access structure, the storage cost of cipher text and time cost of encryption could be saved. 3.1 Existing Scheme CP-ABE system in the past has been used in the context of text records where text records are given various label of privacy and keys to different groups .CP-ABE byte design does not support media and binary records .Due to this disadvantage it cannot be used in many of the practical enterprise applicationandgenerallyislimitedtovarioustext based searching and indexing technique. 3.2 Proposed Scheme In order to overcome this basic drawback of CP-ABE based systems we propose a novel updated CP-ABE system which can be used for both text as well as binary(image records) we develop medical application where patient can register once the patient is registered their text record will be encrypted with privacy setting of admins and doctors patient personal record such as phone number and email-id will be encrypted with an access to only patient and admin as such a doctor would be able to view the patient and his case history but not the personal information,theadmincan upload the medical image(braintumor) withprivacysettings of only doctors and patients. A doctor upon viewing the medical image through a machine learning system. The result of machine learning system is a set of feature vector which will again be encrypted with the policy of only machine learning. The doctor will be able to see whether a particular record is abnormal or normal that information is again encrypted with the policy of doctor and thatparticular patient therefore a patient can view his own record, medical diagnosis observation a doctor will be able to see the patient general information, case history and the medical images and diagnosis but a doctor will not able to visualize the images of the doctors of the other patients a doctor will not able to visualize the personal information of the patient, the admin on the other hand would be able to see all the information of the patient along with their personal information but will not able to view medical diagnosis reports. 3.3 Computation Cost on Data Owner The layered model of access structure is provided so as to achieve multiple hierarchical files sharing. The files are encrypted with one integrated access structure. So, data owner can encrypt the different levels of the files and generate an integrated ciphertext only executing the encryption algorithm one time. Especially, some common attributes should be computed only once instead of many times since each common attribute is appeared in the integrated access structure one time, where the common attribute denotes that it is appeared in multiple access sub- trees associated with k hierarchical files. Assume that there are n common attributes appeared in the m(m ≤ k) access sub-trees associated with the k hierarchical files, the computation workload of the common attributes about ciphertext C(x,y) and C'(x,y) is reduced by 2n(m −1/m), thus the encryption efficiency of data owner is also improved. 3.4 Computation Cost on User In decryption process, users can decrypt all of his authorization files with computationofsecretkeyoncesince transport nodes are added in the access structure with k level nodes. And the bilinear pairing operation of each common nodes used in multiple access sub-trees of the files is computed only once since each common node is also appeared in the integrated access structure one time. Assume that there are n common nodes appeared in the m(m ≤ k) access sub-trees associated with the k hierarchical files, the bilinear pairing computation cost of the common nodes about decryption Decrypt Node(CT, SK,(x, y)) is also reduced by 2n(m−1/m) if the user needs to decrypt the k files. 4. CONCLUSION AND FUTURE WORK In this paper, the proposed scheme gives the encryptionand decryption time which is linearly increasing as the number of attributes are increasing. Therefore, both cipher text storage and time cost of encryption are saved. The proposed scheme has an advantage that users can decrypt all authorization files by computing secret key once. Thus, the time cost of decryption is also saved if the user needs to decrypt multiple files. CP-ABE an adjustment of Attribute Based Encryption (ABE) for the reasons for giving certifications towards the provenance the delicate information Our scheme also enables dynamic modification of access policies o supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. From the survey we understand that some amount of work has been done in the field of cloud computing for several security issues. It can be applied to achieve scalable, flexible, security, privacy, data confidentiality and fine-grainedaccesscontrol ofoutsourced data in cloud computing. There is more scope for future research in the field of secure data sharing in the cloud. We proposed a scheme for efficient identity-based user
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1143 revocation in multi-authority CP-ABE. In the future, our work can be continued in several directions. Securely forwarding the revocation related computations to the CSP (or even to the user). The security of our construction is proved in the generic bilinear group model, although we believe it would be possible to achieve full security by adapting the dual system encryptionmethodology.Thistype of work would be interesting even if it resulted in a moderate loss of efficiency from our existing system. REFERENCES [1] C.-K. Chu, W.-T. Zhu, J. Han, J.-K. Liu, J. Xu, and J. Zhou, “Security concerns in popular cloud storage services,” IEEE Pervasive Comput., vol. 12, no. 4, pp. 50–57, Oct./Dec. 2013. [2] Y. Yang, J. K. Liu, K. Liang, K.-K. R. Choo, and J. Zhou, “Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data,” in Proc. 20th Eur. Symp. Res. Comput. Secur. (ESORICS), vol. 9327. Sep. 2015, pp. 146–166. [3] Sphurti Atram, N. R. Borkar A Review Paper on Attribute-Based Encryption SchemeinCloudComputing 2017 [4] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer, May 2005, pp. 457–473. [5] W. Zhu, J. Yu, T. Wang, P. Zhang, and W. Xie, “Efficient attribute-based encryption from R-LWE,” Chin. J. Electron., vol. 23, no. 4, pp. 778–782, Oct. 2014. [6] V. Goyal, O. Pandey, A. Sahai, and B.Waters”Attribute- based encryption for fine-grained access control of encrypted data," in Proceedings of the 13th ACM conference on Computer and communications security, pp. 89{98, 2006} [7] Minu George1, Dr. C.Suresh Gnanadhas2, Saranya.K3 , A Survey on Attribute Based Encryption Scheme in Cloud Computing.2013
Descargar ahora