info@ijrretas.com
+91 77710 84928 Support
ijrretas LogoIJRRETAS
  • About
    • About The Journal
    • Aim & Scope
    • Privacy Statement
    • Journal Policies
    • Disclaimer
    • Abstracting and Indexing
    • FAQ
  • Current
  • Archive
  • For Author
    • Submit Paper Online
    • Article Processing Charges
    • Submission Guidelines
    • Manuscript Types
    • Download Article Template
    • Download Copyright Form
  • Editorial Board
    • Editorial Board
    • Editors Responsibilities
  • Conference
  • Contact
  • Pay Online
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Scalable Data Sharing in Cloud Storage Using Ciphertext Poling Attribute Base Encryption

Authors: Prajakta D.Patil, Chhaya Nayak

Certificate: View Certificate

Abstract

Abstract -with the recent adoption and diffusion of the information sharing paradigm in distributed systems like online social networks or cloud computing, there are increasing demands and considerations for distributed knowledge security. One in every of the foremost difficult problems in knowledge sharing systems is that the social control of access policies and therefore the support of policies updates. With the event of cryptography, the attribute-based encoding (ABE) attracts widespread attention of the researchers in recent years. The ABE theme that belongs to the general public key encoding mechanism takes attributes as public key and associates them with the cipher text or the user’s secret key. it\'s associate economical thanks to solve open issues in access management situations, as an example, the way to provide knowledge confidentiality and expressive access management at the same time. Cipher text policy attribute-based encoding (CP-ABE) is changing into a promising cryptologic answer to the current issue. It allows knowledge house owners to outline their own access policies over user attributes and enforce the policies on the information to be distributed. Therefore, during this study, we have a tendency to propose a completely unique CP-ABE scheme for an information sharing system by exploiting the characteristic of the system design. The proposed scheme options the subsequent achievements: 1) the key written agreement drawback may well be solved by escrow-free key supplying protocol, that is made using the secure two-party computation between the key generation centre and also the data-storing centre, and 2) fine-grained user revocation per every attribute may be done by proxy cryptography that takes advantage of the selective attribute group key distribution on high of the ABE. The performance and security analyses indicate that the proposed scheme is economical to securely manage the data distributed within the data sharing system. Index Terms--Data sharing, attribute-based cryptography, revocation, access management, removing written agreement. Keywords— Data sharing, attribute-based encryption,revocation, access control, removing escrow.

Introduction

With the development of the web and also the distributedcomputing technology, there is a growing demand for knowledge sharing and process in an open distributed computing atmosphere. RECENT development of the network and computing technology enables many of us to simply share their knowledge with others victimization on-line external storages. people will share their lives with friends by transferring their private photos or messages into the web social networks like Facebook and Myspace; or upload sensitive personal health records (PHRs) into online knowledge servers like Microsoft HealthVault, Google Health for easy sharing with their primary doctors or for price saving. As people enjoy the benefits of those new technologies and services, their issues concerning knowledge security and access management also arise. Improper use of the knowledge by the storage server or unauthorized access by outside users may be potential threats to their data. People would really like to make their sensitive or private knowledge only accessible to the authorized people with credentials them such as the knowledge supplier must provide communicatory access management and data confidentiality once human activity with customers.

Conclusion

In this paper we have a tendency to tend to studied on-line shortest path computation; supported the live traffic circumstances the shortest path results computed/updated. To the matter (due to their preventive maintenance time and large transmission overhead), we have a tendency to tend to carefully analyse the current work and discuss their irrelevancy. To affect the matter, we have a tendency to advise a promising style that broadcasts the index on the air. To work shortest path on a little portion of index, we have a tendency to tend to initial establish an important feature of the stratified index structure that allows us. In our resolution, LTI, This necessary feature is completely used. For on-line shortest path computation, our experiments confirm that LTI is also a Pareto optimum resolution in terms of 4 performance factors. Among the longer term, on time dependent networks, we are attending to extend our resolution depends not solely on current traffic info but put together supported the expected traffic circumstances, this may be a really interesting topic since the selection of a shortest path.

Copyright

Copyright © 2025 Prajakta D.Patil, Chhaya Nayak. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Download Paper

Paper Id: IJRRETAS10

Publish Date: 2016-03-01

ISSN: 2455-4723

Publisher Name: ijrretas

About ijrretas

ijrretas is a leading open-access, peer-reviewed journal dedicated to advancing research in applied sciences and engineering. We provide a global platform for researchers to disseminate innovative findings and technological breakthroughs.

ISSN
2455-4723
Established
2015

Quick Links

Home Submit Paper Author Guidelines Editorial Board Past Issues Topics
Fees Structure Scope & Topics Terms & Conditions Privacy Policy Refund and Cancellation Policy

Contact Us

Vidhya Innovative Technology 514, Pukhraj Corporate Navlakha, Indore (M.P) - India

info@ijrretas.com

+91 77710 84928

www.ijrretas.com

Indexed In
Google Scholar Crossref DOAJ ResearchGate CiteFactor
© 2026 ijrretas. All Rights Reserved.
Privacy Policy Terms of Service