Implement Encryption Using Improved CP-ABE System To Achieve data Confidentiality
Authors: Shweta Patil, Chhaya Nayak
Certificate: View Certificate
Abstract
In cloud computing there is problem associated with whole life of cloud data. For storage three important aspects of data is Data confidentiality, Data integrity and availability. Data encryption is used for confidentiality. Now, after this encryption data is sent to storage. Now, after the user supplies its key than the data is opened. Thus to provide user based security control for cloud provider is the primary objective of this work and can be achieved by Homomorphic encryption. Key management is another problem because the user is not expert to manage keys. The user has faced such problems. To develop a security architecture and implement client based confidentiality tool for storage in cloud computing and evaluate traditional security solutions and identify their remaining issues by which overall performance gets degraded. We will implement homomorphic encryption using improved CP-ABE system to achieve data confidentiality. Keywords: Cloud, Cloud Security , Data privacy, ABE,CP-ABE, Cloud Storage
Introduction
Cloud computing is a standard for supporting global, useful, and on-demand network access to a public pool of configurable processing resources (e.g., networks, servers, storage, applications, and services) that can be promptly provisioned and discharged with least management determination or service provider interaction. It simply means that we can access the on demand services from the cloud which can be the requirement of network, servers, storage, applications and services. There are two main classifications of cloud organization: public cloud and private cloud. To take benefit of public clouds, data vendors must upload their data to marketable cloud service suppliers which are commonly considered to be semi trusted which means we cannot blindly trust them, that is, honest but curious. Which directly means that the cloud service providers will try to find out as much underground information in the users’ subcontracted data as possible, but they will genuinely follow the protocol in over-all. Established approach regulator techniques are established on the postulation that the server is in the confidential field of the data owner, and consequently an all-knowing orientation monitor can be used to implement approach policies against authenticated users. But, in the cloud-computing standard this statement usually does not hold, and hence these solutions are not relevant. There is a need for a decentralized, scalable, and flexible way to mechanism access to cloud data without fully trusting on the cloud service providers. This is the main issue of the cloud regarding the security and safety of the data which is confidential. Thus to provide the security and kept the user’s data confidential we have found a way to keep it secure. The method we are going to propose here will work on a simple approach. We are giving the idea of encryption, in which the user’s data or message which the user wants to transfers on the network will be encrypted. Here the question arises how and which approach will be followed here for the encryption technique used here? The answer to this question is described as
Conclusion
The third party mechanism deals with continuous monitoring of user record. This monitoring along with improved throughput and efficiency is achieved. Out of these methods an enhanced secure scenarios is generated through our proposed CP-ABE. At the initial level of our research, we get the following benefits. ? Improved security solution with less operational overheads and retains reliability on novel encryptions ? Unauthorized access is blocked using improved key generation through user characteristics. Continuous monitoring gives the user behavior measurements and analyzes the
Copyright
Copyright © 2025 Shweta Patil, Chhaya Nayak. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.