Scalable Data Sharing in Cloud Storage Using Ciphertext Poling Attribute Base Encryption
Authors: Prajakta D.Patil, Chhaya Nayak
Certificate: View Certificate
Abstract
Abstract -with the recent adoption and diffusion of the information sharing paradigm in distributed systems like online social networks or cloud computing, there are increasing demands and considerations for distributed knowledge security. One in every of the foremost difficult problems in knowledge sharing systems is that the social control of access policies and therefore the support of policies updates. With the event of cryptography, the attribute-based encoding (ABE) attracts widespread attention of the researchers in recent years. The ABE theme that belongs to the general public key encoding mechanism takes attributes as public key and associates them with the cipher text or the user’s secret key. it\'s associate economical thanks to solve open issues in access management situations, as an example, the way to provide knowledge confidentiality and expressive access management at the same time. Cipher text policy attribute-based encoding (CP-ABE) is changing into a promising cryptologic answer to the current issue. It allows knowledge house owners to outline their own access policies over user attributes and enforce the policies on the information to be distributed. Therefore, during this study, we have a tendency to propose a completely unique CP-ABE scheme for an information sharing system by exploiting the characteristic of the system design. The proposed scheme options the subsequent achievements: 1) the key written agreement drawback may well be solved by escrow-free key supplying protocol, that is made using the secure two-party computation between the key generation centre and also the data-storing centre, and 2) fine-grained user revocation per every attribute may be done by proxy cryptography that takes advantage of the selective attribute group key distribution on high of the ABE. The performance and security analyses indicate that the proposed scheme is economical to securely manage the data distributed within the data sharing system. Index Terms--Data sharing, attribute-based cryptography, revocation, access management, removing written agreement. Keywords— Data sharing, attribute-based encryption,revocation, access control, removing escrow.
Introduction
With the development of the web and also the distributedcomputing technology, there is a growing demand for knowledge sharing and process in an open distributed computing atmosphere. RECENT development of the network and computing technology enables many of us to simply share their knowledge with others victimization on-line external storages. people will share their lives with friends by transferring their private photos or messages into the web social networks like Facebook and Myspace; or upload sensitive personal health records (PHRs) into online knowledge servers like Microsoft HealthVault, Google Health for easy sharing with their primary doctors or for price saving. As people enjoy the benefits of those new technologies and services, their issues concerning knowledge security and access management also arise. Improper use of the knowledge by the storage server or unauthorized access by outside users may be potential threats to their data. People would really like to make their sensitive or private knowledge only accessible to the authorized people with credentials them such as the knowledge supplier must provide communicatory access management and data confidentiality once human activity with customers.
Conclusion
In this paper we have a tendency to tend to studied on-line shortest path computation; supported the live traffic circumstances the shortest path results computed/updated. To the matter (due to their preventive maintenance time and large transmission overhead), we have a tendency to tend to carefully analyse the current work and discuss their irrelevancy. To affect the matter, we have a tendency to advise a promising style that broadcasts the index on the air. To work shortest path on a little portion of index, we have a tendency to tend to initial establish an important feature of the stratified index structure that allows us. In our resolution, LTI, This necessary feature is completely used. For on-line shortest path computation, our experiments confirm that LTI is also a Pareto optimum resolution in terms of 4 performance factors. Among the longer term, on time dependent networks, we are attending to extend our resolution depends not solely on current traffic info but put together supported the expected traffic circumstances, this may be a really interesting topic since the selection of a shortest path.
Copyright
Copyright © 2025 Prajakta D.Patil, Chhaya Nayak. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.