SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1107
CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION AND WITH
DELEGATION EMERGES IN CLOUD COMPUTING
KODEDALA CHAND BEE1, C S MAHABOOBBEE2, T PADMA3
1M.Tech Scholar, ST.MARK Educational Institution Society Group Institutions.
2,3 Assistant Professor, ST.MARK Educational Institution Society Group Institutions.
-------------------------------------------------------------------------***-----------------------------------------------------------------------
ABSTRACT: We propose a new design for large-scale
multimedia content protection systems. Our design
leverages cloud infrastructures to provide cost
efficiency, rapid deployment, scalability, and elasticity to
accommodate varying workloads. The proposed system
can be used to protect different multimedia content
types, including 2-D videos, 3-D videos, images, audio
clips, songs, and music clips. The system can be deployed
on private and/or public clouds. Our system has two
novel components: (i) method to create signatures of 3-D
videos, and (ii) distributed matching engine for
multimedia objects. The signature method creates robust
and representative signatures of 3-D videos that capture
the depth signals in these videos and it is
computationally efficient to compute and compare as
well as it requires small storage. The distributed
matching engine achieves high scalability and it is
designed to support different multimedia objects. We
implemented the proposed system and deployed it on
two clouds: Amazon cloud and our private cloud. Our
experiments with more than 11,000 3-D videos and 1
million images show the high accuracy and scalability of
the proposed system. In addition, we compared our
system to the protection system used by YouTube and
our results show that the YouTube protection system
fails to detect most copies of 3-D videos, while our
system detects more than 98% of them. This comparison
shows the need for the proposed 3-D signature method,
since the state-of-the-art commercial system was not
able to handle 3-D videos.
1 INTRODUCTION
Cloud computing is the utilization of registering
belongings (gear and programming) that are conveyed
as an administration over a method (in general the
internet). The title originates from the basic utilization of
a cloud-formed picture as a deliberation for the
unpredictable base it involves in framework graphs.
Disbursed computing depends far off firms with a
consumer's data, programming and computation.
Disbursed computing entails gear and programming
assets made available on the web as supervised outcast
corporations. These businesses more commonly present
access to forefront programming applications and top
quality frameworks of server PCs.
Fig 1.1 Structure of Cloud Computing
1.2 Working of Cloud Computing
The objective of distributed computing is to
apply fashioned supercomputing, or sophisticated
processing energy, usually utilized by way of military
and exploration offices, to participate in many trillions of
calculations every 2nd, in client organized purposes, for
example, money related portfolios, to carry personalized
knowledge, to give expertise stockpiling or to affect
mammoth, immersive computer diversions.
Characteristics and Services Models
The salient characteristics of cloud computing
founded on the definitions supplied by way of the
country wide Institute of requisites and Terminology
(NIST) are outlined below:
 On-demand self-carrier: A customer can unilaterally
provision computing capabilities, corresponding to
server time and community storage, as wanted
routinely without requiring human interaction with
each and every provider’s provider.
 Large community access: Capabilities are on hand
over the network and accessed through typical
mechanisms that promote use with the aid of
heterogeneous thin or thick customer systems (e.G.,
mobile telephones, laptops, and PDAs).
 Useful resource pooling: The provider's processing
assets are pooled to serve more than a few
customers utilising a multi-inhabitant model, with
various physical and digital property swiftly
distributed and reassigned with the aid of curiosity.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1108
There is a feeling of subject autonomy in that the
customer for essentially the most phase has no
manage or learning over the specific subject of the
gave property nevertheless could have the capacity
to examine subject at a bigger amount of
deliberation (e.G., nation, state, or server farm).
Illustrations of assets incorporate stockpiling,
making ready, reminiscence, system data switch
capability, and digital machines.
Services Models
Cloud Computing comprises three exclusive
provider items, namely Infrastructure-as-a-provider
(IaaS), Platform-as-a-provider (PaaS), and application-
as-a-service (SaaS). The three provider models or layer
are accomplished with the aid of an end person layer
that encapsulates the end person perspective on cloud
services. If she accesses a carrier on the applying layer,
these tasks are most likely looked after by using the
cloud service supplier.
1.3 Advantages of Cloud Computing
1. Attain economies of scale increase quantity yield or
efficiency with less participants. Your fee every unit,
task or object falls..
2. Reduce spending on science infrastructure. .
Maintain up simple access to your data with
negligible forthright spending. Pay as you go (week
after week, quarterly or each year), in light of
curiosity.
3. Globalize your workforce on the affordable. Persons
international can get to the cloud, if they've an
internet organization.
4. Four. Streamline strategies. Get more work
executed in much less time with less individuals.
5. Reduce capital costs. There's no compelling reason
to spend gigantic money on gear, programming or
authorizing fees.
6. Reinforce accessibility. You may have admittance at
something time, at any place, making your lifestyles
so much easier!
7. Display initiatives extra quite simply. Stay within
spending plan and in entrance of consummation
method durations.
8. Much less personnel training is required. It takes
much less contributors to accomplish extra chip
away at a cloud, with a negligible expectation to
absorb understanding on gear and programming
issues
1.4 Area of Research
Attribute based encryption sahai and waters proposed
the notation of attribute based encryption. The focused
on policies across multiple authorities and issue of what
expression could achieve the strongest form of
expression is Boolean formula in ABE system. Which
still for from being able to expresses access control in
the form of any program or circuit. Actually there still
remains two problems the first one is there have no
construction for realizing CP-ABE for general circuits.
The other is related to the efficiency, since the existing
circuits ABE scheme just a bit encryption one thus it is
apparently still remaining a pivotal open problem to
design an efficient circuit CP-ABE scheme.
The first ABE with outsourcing decryption scheme to
reduce the computation cost during decryption. After
that proposed the definition of ABE with verifiable
outsourced decryption. They seek to gurantee the
correctness of the original cheaper text by using a
commitment. However since the data owner generates a
commitment without any secret value.
2. PROPOSED WORK AND ANALYSIS
In this chapter discussion about Existing System,
Disadvantages of the Existing System and Techniqes
used in Proposed System Advantages Proposed System
and system Architecture.
2.1 Existing System
The servers could be wont to handle and
calculate varied information consistent with the user’s
demands. As applications move to cloud computing
platforms, ciphertext-policy attribute-based encryption
(CP-ABE) and verifiable delegation (VD) square measure
used to make sure the information confidentiality and
also the verifiability of delegation on dishonest cloud
servers. The increasing volumes of medical images and
medical records, the healthcare organizations place a
massive quantity of knowledge within the cloud for
reducing data storage prices and supporting medical
cooperation. There are 2 complementary forms of
attribute primarily based secret writing. One is key-
policy attribute-based secret writing (KP-ABE) and the
alternative is ciphertext-policy attribute-based
encryption (CPABE).
2.1.1 Disadvantages of Existing System
 The cloud server might tamper or replace the
information owner’s original ciphertext for
malicious attacks, and then respond a false
transformed ciphertext.
 The cloud server might cheat the approved user
for value saving. Though the servers may not
respond an accurate reworked ciphertext to AN
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1109
unauthorized user, he could cheat AN approved
one that he/she isn't eligible.
2.2 Proposed System
We first off gift a circuit ciphertext-policy
attribute-based hybrid secret writing with verifiable
delegation theme. General circuits are used to specific
the strongest variety of access management policy. the
proposed theme is well-tried to be secure primarily
based on k-multilinear Decisional Diffie-Hellman
assumption. On the other hand, we implement our theme
over the integers. During the delegation computing, a
user could validate whether or not the cloud server
responds a correct reworked ciphertext to assist
him/her decipher the ciphertext straightaway and
properly.
2.2.1 Advantages of Proposed System
 The generic KEM/DEM construction for hybrid
encodeion that will encrypt messages of discretional
length.
 They seek to guarantee the correctness of the initial
ciphertext by employing a commitment.
 We give the anti-collusion circuit CP-ABE
construction in this paper for the rationale that
CPABE is conceptually nearer to the standard access
management strategies.
2.3 System Architecture
Fig 2 System Architecture
Data owner send the original message in the
form of encryption format. It is cipher text. It is not a
readable format. Receive the message to the user
through cloud storage. If verification is yes then
message can be readable and decryption the message. If
key is send user can open the file otherwise not open the
file. If verification is no then message cannot readable.
2.4 System Study
2.4.1 Feasibility Study
The achievability of the mission is dissected in
this stage and business proposition is evolved with an
especially wide association for the project and some rate
gauges. Amid framework examination the probability
investigation of the proposed framework is to be
completed. That is to guarantee that the proposed
framework is just not a weight to the group. For
possibility examination, some comprehension of the
giant prerequisites for the framework is principal.
Three key considerations involved in the feasibility
analysis are
 Economical Feasibility
 Technical Feasibility
 Social Feasibility
2.4.2 Economical Feasibility
This learns is accomplished to assess the
financial influence that the framework can have on the
organization. The measure of believe that the group can
fill the revolutionary work of the framework is limited.
The consumptions must be legitimized. For this reason
the created framework too throughout the economic
allowance and this used to be attained to in gentle of the
fact that the vast majority of the advances utilized are
uninhibitedly accessible. Just the tweaked items must be
received.
2.4.3 Technical Feasibility
This learn is done to assess the specialized
attainability, that's, the specialized requirements of the
framework. Any framework created must now not have
an attraction on the obtainable specialized assets. This
will prompt levels of popularity on the available
specialised assets. This may occasionally immediate
phases of repute being set on the consumer. The created
framework have to have a humble necessity, as just
negligible or invalid changes are needed for actualizing
this framework.
3. IMPLEMENTATION
Implementation is the stage of the project when
the theoretical design is turned out into a working
system. Thus it can be considered to be the most critical
stage in achieving a successful new system and in giving
the user, confidence that the new system will work and
be effective. The implementation stage involves careful
planning, investigation of the existing system and it’s
constraints on implementation, designing of methods to
achieve changeover and evaluation of changeover
methods.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1110
3.1 Modules
 Attribute Authority
 Cloud Server
 Data owner
 Data Consumer
3.1.1 Attribute Authority
Authority will have to offer the key, as per the
user's key request. Every users request can have to be
raised to authority to induce access key on mail. There
are 2 complementary forms of attribute-based secret
writing. One is key-policy attribute-based secret writing
(KP-ABE) and the alternative is ciphertext-policy
attribute-based encryption (CPABE). In a KP-ABE
system, the decision of access policy is created by the key
distributor rather than the encipherer, which limits the
usefulness and usability for the system in sensible
applications.
3.2 Cloud Server
Cloud server will have the access to files that
square measure uploaded by the information owner
Cloud server needs to decipher the files offered
underneath their permission. Furthermore information
user can have to decipher the info to access the initial
text by providing the individual key. File has been
decrypted successfully and provided for shopper.
3.2.1 Data Owner
Data owner can have to register initio to induce
access to the profile. Data Owner can transfer the file to
the cloud server in the encrypted format. Random
encryption key generation is happening whereas
uploading the file to the cloud. Encrypted file will be hold
on the cloud.
3.2.2 Data Consumer
Data shopper can be initio raise for the key to
the Authority to verify and decipher the enter the cloud.
Data shopper will access the file primarily based on the
key received from mail id. As per the key received the
consumer will verify and decipher the info from the
cloud.
4. RESULTS
In this chapter the software requirements and the
hardware requirements that are necessary to execute
the extraction pattern are specified. The graphical user
interface that the user or performs while utilizing the
CP-ABE and verifiable delegation are discussed.
4.1 System Requirements
Hardware Requirements
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Monitor : 15 VGA Colour.
 Ram : 512 Mb.
Software Requirements
 Operating system : Windows XP/7.
 Coding Language : JAVA/J2EE
 IDE : Netbeans 7.4
 Database : MYSQL
4.2 Execution Results
In this section it describes the entity disambiguity.
In this section each and every screen shot has been
presented and The graphical user interface that the user
or performs while utilizing the CP-ABE and verifiable
delegation are discussed.
4.2.1 Home Page
Fig 3 Home Page
This screen describes about the registration of
data owner, data consumer , authority , data owner
registration , cloud.
4.2.2 Data Owner Registration
Fig 4 Data Owner Registration
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1111
This screen describes about the data owner
registration form with the following fields like userid,
password, age, mail id etc.
4.2.3 Data Consumer Registration
Fig 5 Data Consumer Registration
This screen describes about the data consumer
registration form with the following fields like userid,
password, age, mail id etc.
4.2.4 Owner Login
Fig 6 Owner Login
This screen tells about the data owner login
with the required fields. User id and password for owner
login page.
4.2.5 File Upload
Fig 7 File Upload
This screen tells about the file upload. Owner
upload the file through the cloud storage . File is
encryption format . file cannot be readable.
4.2.6 Key Generation
Fig 8 Key Generation
The above figure explains the consumer send
the key to the authority. And send the request of the key.
Authority access the key and permit to login.
4.2.7 Cloud Login
Fig 9 Cloud Login
The above figure show that owner login into the
system. Owner is upload the file.after that cloud login
into the system . to access the file upload by the owner.
4.2.8 Cloud Home
Fig 10 Cloud Home
The above figure show that cloud home fields are the
cloud server, partial decrypt, logout.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1112
4.2.9 Partial Decrypte Text File Page
Fig 11 Partial Decrypte Text File Page
The above figure shows that file is partial decryption. It
is readable format. Cloud activities are partial
decryption.
4.2.10 Consumer Login
Fig 12 Consumer Login
The above figure show that consumer login
required field user id and password. Consumer send the
key to the authority . and request the file to the
authority.
4.2.11 Authority Send Key
Fig 13 Authority Send Key
The above figure shows that consumer send the key to
authority. And key request of the file to the authority.
The key not a readable format.
4.2.12 Verifiable Data Consumer
Fig 14 Verifiable Data Consumer
The above figure shows that data consumer
upload the file by owner , upload file name , upload date,
decrypt the file
4.2.13 Partial Decrypted data on File
Fig 15 Partial Decrypted data on File
The above figure show that cloud partial decrypt data of
the file. And file is readable format.
4.2.14 Key Send Mail
Fig 16 Key Send Mail
The above figure show that the cloud send the
decryption key to mail. And key is readable format.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1113
4.2.15 File View
Fig 17 File View
The above figure show that file view by the
authority. Consumer sends the key, request of the key to
the mail.
4.2.16 File Download
Fig 18 File Download
The above figure show the file download by the
authority. Decryption the file. File view by authority.
CONCLUSION
To the best of our knowledge, we first off gift a
circuit cipher text-policy attribute-based hybrid secret
writing with verifiable delegation theme. General circuits
are used to specific the strongest variety of access
management policy. Combined verifiable computation
and encrypt-then-mac mechanism with our ciphertext
policy attribute-based hybrid encryption, we may
delegate the verifiable partial decoding paradigm to the
cloud server. In addition, the proposed theme is well-
tried to be secure primarily based on k-multilinear
Decisional Diffie-Hellman assumption. On the other
hand, we implement our theme over the integers. The
costs of the computation and communication
consumption show that the theme is sensible within the
cloud computing. Thus, we may apply it to guarantee the
info confidentiality, the fine-grained access control and
the verifiable delegation in cloud.
A circuit cipher text-policy attribute-based
hybrid encryption with verifiable delegation scheme is
presented, circuits are used to state the secure type of
access control policy. Certifiable computation and
encrypt-then-mac mechanism are combined with
ciphertext-policy attribute-based hybrid encryption and
assign the verifiable partial decryption paradigm to the
cloud server. The expenses of the computation and
communique consumption show that the scheme is
useful in the cloud computing.
REFERENCES
1] A. Shamir, “Identity-based cryptosystems and
signature schemes,” in Advances in Cryptology.
Berlin, Germany: Springer-Verlag, 1985, pp. 47–53.
[2] A. Sahai and B. Waters, “Fuzzy identity-based
encryption,” in Advances in Cryptology. Berlin,
Germany: Springer-Verlag, 2005, pp. 457–473.
[3] V. Goyal, O. Pandey, A. Sahai, and B. Waters,
“Attribute-based encryption for fine-grained access
control of encrypted data,” in Proc. 13th CCS, 2006,
pp. 89–98.
[4] J. Bethencourt, A. Sahai, and B. Waters,
“Ciphertext-policy attribute based encryption,” in
Proc. IEEE SP, May 2007, pp. 321–334.
[5] M. Chase, “Multi-authority attribute based
encryption,” in Theory of Cryptography. Berlin,
Germany: Springer-Verlag, 2007, pp. 515–534.

Más contenido relacionado

La actualidad más candente

An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution Conference Papers
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingIOSR Journals
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET Journal
 
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...IRJET Journal
 
Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Conference Papers
 
IMPROVING PRIVACY AND SECURITY IN MULTITENANT CLOUD ERP SYSTEMS
IMPROVING PRIVACY AND SECURITY IN MULTITENANT CLOUD ERP SYSTEMSIMPROVING PRIVACY AND SECURITY IN MULTITENANT CLOUD ERP SYSTEMS
IMPROVING PRIVACY AND SECURITY IN MULTITENANT CLOUD ERP SYSTEMSacijjournal
 
A Comparative Review on Fault Tolerance methods and models in Cloud Computing
A Comparative Review on Fault Tolerance methods and models in Cloud ComputingA Comparative Review on Fault Tolerance methods and models in Cloud Computing
A Comparative Review on Fault Tolerance methods and models in Cloud ComputingIRJET Journal
 
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational DatabaseIRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational DatabaseIRJET Journal
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET Journal
 
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...IRJET Journal
 
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and AdoptionTransforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoptionijtsrd
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET Journal
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
Information Technology for the success of Infrastructure Projects
Information Technology for the success of Infrastructure ProjectsInformation Technology for the success of Infrastructure Projects
Information Technology for the success of Infrastructure ProjectsVSR *
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingIJECEIAES
 

La actualidad más candente (20)

An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
 
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
 
Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...
 
IMPROVING PRIVACY AND SECURITY IN MULTITENANT CLOUD ERP SYSTEMS
IMPROVING PRIVACY AND SECURITY IN MULTITENANT CLOUD ERP SYSTEMSIMPROVING PRIVACY AND SECURITY IN MULTITENANT CLOUD ERP SYSTEMS
IMPROVING PRIVACY AND SECURITY IN MULTITENANT CLOUD ERP SYSTEMS
 
A Comparative Review on Fault Tolerance methods and models in Cloud Computing
A Comparative Review on Fault Tolerance methods and models in Cloud ComputingA Comparative Review on Fault Tolerance methods and models in Cloud Computing
A Comparative Review on Fault Tolerance methods and models in Cloud Computing
 
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational DatabaseIRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
IRJET-RRW- Robust and Reversible Watermarking Technique for Relational Database
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
 
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
 
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and AdoptionTransforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoption
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
V04405122126
V04405122126V04405122126
V04405122126
 
Information Technology for the success of Infrastructure Projects
Information Technology for the success of Infrastructure ProjectsInformation Technology for the success of Infrastructure Projects
Information Technology for the success of Infrastructure Projects
 
F01113945
F01113945F01113945
F01113945
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of Computing
 

Similar a IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation Emerges in Cloud Computing

IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONIRJET Journal
 
Autonomous Platform with AIML Document Intelligence Capabilities to Handle Se...
Autonomous Platform with AIML Document Intelligence Capabilities to Handle Se...Autonomous Platform with AIML Document Intelligence Capabilities to Handle Se...
Autonomous Platform with AIML Document Intelligence Capabilities to Handle Se...IRJET Journal
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
 
IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...
IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...
IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...IRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...IRJET Journal
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET Journal
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...IRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET-  	  Cloud Computing: Security Issues Challenges and SolutionIRJET-  	  Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and SolutionIRJET Journal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...IRJET Journal
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET Journal
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...IRJET Journal
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewIRJET Journal
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and ChallengesIRJET Journal
 

Similar a IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation Emerges in Cloud Computing (20)

IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
 
Autonomous Platform with AIML Document Intelligence Capabilities to Handle Se...
Autonomous Platform with AIML Document Intelligence Capabilities to Handle Se...Autonomous Platform with AIML Document Intelligence Capabilities to Handle Se...
Autonomous Platform with AIML Document Intelligence Capabilities to Handle Se...
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...
IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...
IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET-  	  Cloud Computing: Security Issues Challenges and SolutionIRJET-  	  Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 

Más de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 

Último (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 

IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation Emerges in Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1107 CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION AND WITH DELEGATION EMERGES IN CLOUD COMPUTING KODEDALA CHAND BEE1, C S MAHABOOBBEE2, T PADMA3 1M.Tech Scholar, ST.MARK Educational Institution Society Group Institutions. 2,3 Assistant Professor, ST.MARK Educational Institution Society Group Institutions. -------------------------------------------------------------------------***----------------------------------------------------------------------- ABSTRACT: We propose a new design for large-scale multimedia content protection systems. Our design leverages cloud infrastructures to provide cost efficiency, rapid deployment, scalability, and elasticity to accommodate varying workloads. The proposed system can be used to protect different multimedia content types, including 2-D videos, 3-D videos, images, audio clips, songs, and music clips. The system can be deployed on private and/or public clouds. Our system has two novel components: (i) method to create signatures of 3-D videos, and (ii) distributed matching engine for multimedia objects. The signature method creates robust and representative signatures of 3-D videos that capture the depth signals in these videos and it is computationally efficient to compute and compare as well as it requires small storage. The distributed matching engine achieves high scalability and it is designed to support different multimedia objects. We implemented the proposed system and deployed it on two clouds: Amazon cloud and our private cloud. Our experiments with more than 11,000 3-D videos and 1 million images show the high accuracy and scalability of the proposed system. In addition, we compared our system to the protection system used by YouTube and our results show that the YouTube protection system fails to detect most copies of 3-D videos, while our system detects more than 98% of them. This comparison shows the need for the proposed 3-D signature method, since the state-of-the-art commercial system was not able to handle 3-D videos. 1 INTRODUCTION Cloud computing is the utilization of registering belongings (gear and programming) that are conveyed as an administration over a method (in general the internet). The title originates from the basic utilization of a cloud-formed picture as a deliberation for the unpredictable base it involves in framework graphs. Disbursed computing depends far off firms with a consumer's data, programming and computation. Disbursed computing entails gear and programming assets made available on the web as supervised outcast corporations. These businesses more commonly present access to forefront programming applications and top quality frameworks of server PCs. Fig 1.1 Structure of Cloud Computing 1.2 Working of Cloud Computing The objective of distributed computing is to apply fashioned supercomputing, or sophisticated processing energy, usually utilized by way of military and exploration offices, to participate in many trillions of calculations every 2nd, in client organized purposes, for example, money related portfolios, to carry personalized knowledge, to give expertise stockpiling or to affect mammoth, immersive computer diversions. Characteristics and Services Models The salient characteristics of cloud computing founded on the definitions supplied by way of the country wide Institute of requisites and Terminology (NIST) are outlined below:  On-demand self-carrier: A customer can unilaterally provision computing capabilities, corresponding to server time and community storage, as wanted routinely without requiring human interaction with each and every provider’s provider.  Large community access: Capabilities are on hand over the network and accessed through typical mechanisms that promote use with the aid of heterogeneous thin or thick customer systems (e.G., mobile telephones, laptops, and PDAs).  Useful resource pooling: The provider's processing assets are pooled to serve more than a few customers utilising a multi-inhabitant model, with various physical and digital property swiftly distributed and reassigned with the aid of curiosity.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1108 There is a feeling of subject autonomy in that the customer for essentially the most phase has no manage or learning over the specific subject of the gave property nevertheless could have the capacity to examine subject at a bigger amount of deliberation (e.G., nation, state, or server farm). Illustrations of assets incorporate stockpiling, making ready, reminiscence, system data switch capability, and digital machines. Services Models Cloud Computing comprises three exclusive provider items, namely Infrastructure-as-a-provider (IaaS), Platform-as-a-provider (PaaS), and application- as-a-service (SaaS). The three provider models or layer are accomplished with the aid of an end person layer that encapsulates the end person perspective on cloud services. If she accesses a carrier on the applying layer, these tasks are most likely looked after by using the cloud service supplier. 1.3 Advantages of Cloud Computing 1. Attain economies of scale increase quantity yield or efficiency with less participants. Your fee every unit, task or object falls.. 2. Reduce spending on science infrastructure. . Maintain up simple access to your data with negligible forthright spending. Pay as you go (week after week, quarterly or each year), in light of curiosity. 3. Globalize your workforce on the affordable. Persons international can get to the cloud, if they've an internet organization. 4. Four. Streamline strategies. Get more work executed in much less time with less individuals. 5. Reduce capital costs. There's no compelling reason to spend gigantic money on gear, programming or authorizing fees. 6. Reinforce accessibility. You may have admittance at something time, at any place, making your lifestyles so much easier! 7. Display initiatives extra quite simply. Stay within spending plan and in entrance of consummation method durations. 8. Much less personnel training is required. It takes much less contributors to accomplish extra chip away at a cloud, with a negligible expectation to absorb understanding on gear and programming issues 1.4 Area of Research Attribute based encryption sahai and waters proposed the notation of attribute based encryption. The focused on policies across multiple authorities and issue of what expression could achieve the strongest form of expression is Boolean formula in ABE system. Which still for from being able to expresses access control in the form of any program or circuit. Actually there still remains two problems the first one is there have no construction for realizing CP-ABE for general circuits. The other is related to the efficiency, since the existing circuits ABE scheme just a bit encryption one thus it is apparently still remaining a pivotal open problem to design an efficient circuit CP-ABE scheme. The first ABE with outsourcing decryption scheme to reduce the computation cost during decryption. After that proposed the definition of ABE with verifiable outsourced decryption. They seek to gurantee the correctness of the original cheaper text by using a commitment. However since the data owner generates a commitment without any secret value. 2. PROPOSED WORK AND ANALYSIS In this chapter discussion about Existing System, Disadvantages of the Existing System and Techniqes used in Proposed System Advantages Proposed System and system Architecture. 2.1 Existing System The servers could be wont to handle and calculate varied information consistent with the user’s demands. As applications move to cloud computing platforms, ciphertext-policy attribute-based encryption (CP-ABE) and verifiable delegation (VD) square measure used to make sure the information confidentiality and also the verifiability of delegation on dishonest cloud servers. The increasing volumes of medical images and medical records, the healthcare organizations place a massive quantity of knowledge within the cloud for reducing data storage prices and supporting medical cooperation. There are 2 complementary forms of attribute primarily based secret writing. One is key- policy attribute-based secret writing (KP-ABE) and the alternative is ciphertext-policy attribute-based encryption (CPABE). 2.1.1 Disadvantages of Existing System  The cloud server might tamper or replace the information owner’s original ciphertext for malicious attacks, and then respond a false transformed ciphertext.  The cloud server might cheat the approved user for value saving. Though the servers may not respond an accurate reworked ciphertext to AN
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1109 unauthorized user, he could cheat AN approved one that he/she isn't eligible. 2.2 Proposed System We first off gift a circuit ciphertext-policy attribute-based hybrid secret writing with verifiable delegation theme. General circuits are used to specific the strongest variety of access management policy. the proposed theme is well-tried to be secure primarily based on k-multilinear Decisional Diffie-Hellman assumption. On the other hand, we implement our theme over the integers. During the delegation computing, a user could validate whether or not the cloud server responds a correct reworked ciphertext to assist him/her decipher the ciphertext straightaway and properly. 2.2.1 Advantages of Proposed System  The generic KEM/DEM construction for hybrid encodeion that will encrypt messages of discretional length.  They seek to guarantee the correctness of the initial ciphertext by employing a commitment.  We give the anti-collusion circuit CP-ABE construction in this paper for the rationale that CPABE is conceptually nearer to the standard access management strategies. 2.3 System Architecture Fig 2 System Architecture Data owner send the original message in the form of encryption format. It is cipher text. It is not a readable format. Receive the message to the user through cloud storage. If verification is yes then message can be readable and decryption the message. If key is send user can open the file otherwise not open the file. If verification is no then message cannot readable. 2.4 System Study 2.4.1 Feasibility Study The achievability of the mission is dissected in this stage and business proposition is evolved with an especially wide association for the project and some rate gauges. Amid framework examination the probability investigation of the proposed framework is to be completed. That is to guarantee that the proposed framework is just not a weight to the group. For possibility examination, some comprehension of the giant prerequisites for the framework is principal. Three key considerations involved in the feasibility analysis are  Economical Feasibility  Technical Feasibility  Social Feasibility 2.4.2 Economical Feasibility This learns is accomplished to assess the financial influence that the framework can have on the organization. The measure of believe that the group can fill the revolutionary work of the framework is limited. The consumptions must be legitimized. For this reason the created framework too throughout the economic allowance and this used to be attained to in gentle of the fact that the vast majority of the advances utilized are uninhibitedly accessible. Just the tweaked items must be received. 2.4.3 Technical Feasibility This learn is done to assess the specialized attainability, that's, the specialized requirements of the framework. Any framework created must now not have an attraction on the obtainable specialized assets. This will prompt levels of popularity on the available specialised assets. This may occasionally immediate phases of repute being set on the consumer. The created framework have to have a humble necessity, as just negligible or invalid changes are needed for actualizing this framework. 3. IMPLEMENTATION Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1110 3.1 Modules  Attribute Authority  Cloud Server  Data owner  Data Consumer 3.1.1 Attribute Authority Authority will have to offer the key, as per the user's key request. Every users request can have to be raised to authority to induce access key on mail. There are 2 complementary forms of attribute-based secret writing. One is key-policy attribute-based secret writing (KP-ABE) and the alternative is ciphertext-policy attribute-based encryption (CPABE). In a KP-ABE system, the decision of access policy is created by the key distributor rather than the encipherer, which limits the usefulness and usability for the system in sensible applications. 3.2 Cloud Server Cloud server will have the access to files that square measure uploaded by the information owner Cloud server needs to decipher the files offered underneath their permission. Furthermore information user can have to decipher the info to access the initial text by providing the individual key. File has been decrypted successfully and provided for shopper. 3.2.1 Data Owner Data owner can have to register initio to induce access to the profile. Data Owner can transfer the file to the cloud server in the encrypted format. Random encryption key generation is happening whereas uploading the file to the cloud. Encrypted file will be hold on the cloud. 3.2.2 Data Consumer Data shopper can be initio raise for the key to the Authority to verify and decipher the enter the cloud. Data shopper will access the file primarily based on the key received from mail id. As per the key received the consumer will verify and decipher the info from the cloud. 4. RESULTS In this chapter the software requirements and the hardware requirements that are necessary to execute the extraction pattern are specified. The graphical user interface that the user or performs while utilizing the CP-ABE and verifiable delegation are discussed. 4.1 System Requirements Hardware Requirements  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Monitor : 15 VGA Colour.  Ram : 512 Mb. Software Requirements  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL 4.2 Execution Results In this section it describes the entity disambiguity. In this section each and every screen shot has been presented and The graphical user interface that the user or performs while utilizing the CP-ABE and verifiable delegation are discussed. 4.2.1 Home Page Fig 3 Home Page This screen describes about the registration of data owner, data consumer , authority , data owner registration , cloud. 4.2.2 Data Owner Registration Fig 4 Data Owner Registration
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1111 This screen describes about the data owner registration form with the following fields like userid, password, age, mail id etc. 4.2.3 Data Consumer Registration Fig 5 Data Consumer Registration This screen describes about the data consumer registration form with the following fields like userid, password, age, mail id etc. 4.2.4 Owner Login Fig 6 Owner Login This screen tells about the data owner login with the required fields. User id and password for owner login page. 4.2.5 File Upload Fig 7 File Upload This screen tells about the file upload. Owner upload the file through the cloud storage . File is encryption format . file cannot be readable. 4.2.6 Key Generation Fig 8 Key Generation The above figure explains the consumer send the key to the authority. And send the request of the key. Authority access the key and permit to login. 4.2.7 Cloud Login Fig 9 Cloud Login The above figure show that owner login into the system. Owner is upload the file.after that cloud login into the system . to access the file upload by the owner. 4.2.8 Cloud Home Fig 10 Cloud Home The above figure show that cloud home fields are the cloud server, partial decrypt, logout.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1112 4.2.9 Partial Decrypte Text File Page Fig 11 Partial Decrypte Text File Page The above figure shows that file is partial decryption. It is readable format. Cloud activities are partial decryption. 4.2.10 Consumer Login Fig 12 Consumer Login The above figure show that consumer login required field user id and password. Consumer send the key to the authority . and request the file to the authority. 4.2.11 Authority Send Key Fig 13 Authority Send Key The above figure shows that consumer send the key to authority. And key request of the file to the authority. The key not a readable format. 4.2.12 Verifiable Data Consumer Fig 14 Verifiable Data Consumer The above figure shows that data consumer upload the file by owner , upload file name , upload date, decrypt the file 4.2.13 Partial Decrypted data on File Fig 15 Partial Decrypted data on File The above figure show that cloud partial decrypt data of the file. And file is readable format. 4.2.14 Key Send Mail Fig 16 Key Send Mail The above figure show that the cloud send the decryption key to mail. And key is readable format.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1113 4.2.15 File View Fig 17 File View The above figure show that file view by the authority. Consumer sends the key, request of the key to the mail. 4.2.16 File Download Fig 18 File Download The above figure show the file download by the authority. Decryption the file. File view by authority. CONCLUSION To the best of our knowledge, we first off gift a circuit cipher text-policy attribute-based hybrid secret writing with verifiable delegation theme. General circuits are used to specific the strongest variety of access management policy. Combined verifiable computation and encrypt-then-mac mechanism with our ciphertext policy attribute-based hybrid encryption, we may delegate the verifiable partial decoding paradigm to the cloud server. In addition, the proposed theme is well- tried to be secure primarily based on k-multilinear Decisional Diffie-Hellman assumption. On the other hand, we implement our theme over the integers. The costs of the computation and communication consumption show that the theme is sensible within the cloud computing. Thus, we may apply it to guarantee the info confidentiality, the fine-grained access control and the verifiable delegation in cloud. A circuit cipher text-policy attribute-based hybrid encryption with verifiable delegation scheme is presented, circuits are used to state the secure type of access control policy. Certifiable computation and encrypt-then-mac mechanism are combined with ciphertext-policy attribute-based hybrid encryption and assign the verifiable partial decryption paradigm to the cloud server. The expenses of the computation and communique consumption show that the scheme is useful in the cloud computing. REFERENCES 1] A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1985, pp. 47–53. [2] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 457–473. [3] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. 13th CCS, 2006, pp. 89–98. [4] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption,” in Proc. IEEE SP, May 2007, pp. 321–334. [5] M. Chase, “Multi-authority attribute based encryption,” in Theory of Cryptography. Berlin, Germany: Springer-Verlag, 2007, pp. 515–534.