Multilevel Attribute Based Encryption in Cloud

Authors(2) :-B. K. N. Priyanka, R. Balamurugan

Disseminated registering is a rising preparing perspective engaging clients to remotely keep their certainties in a server and give on-ask for offices. With the improvement of sharing mystery organization data on cloud the server records security and assurance transformed into the key issues for distant realities accumulating. Secure utilizer approved data get the chance to control machine ought to be given ahead of time of cloud utilizer has the flexibility to outsource touchy data to the cloud for the limit. In the show, various cryptographic estimations are utilized for encryption of the actualities. In this paper, we can observe sundry plans for encryption and feasible answers for their circumscriptions that involve of Attribute predicated encryption(ABE), Key approach Attribute predicated encryption(KP-ABE), Cipher content Attribute predicated encryption(CP-ABE), non-monotonic motivate admission to structure, Hierarchical Attribute predicated encryption(HABE), Different expert Attribute predicated encryption(MA-ABE).

Authors and Affiliations

B. K. N. Priyanka
M.Tech Scholar, Department of Computer Science & Engineering, Bharat Institute of Engineering &Technology, Hyderabad, India
R. Balamurugan
Associate Professor, Department of Computer Science &Engineering, Bharat Institute of Engineering &Technology, Hyderabad, India

Cloud Computing, Data Sharing, ?le Hierarchy, Ciphertext-Policy, Attribute-Based Encryption

  1. M. Chase and S.S.M. Chow, "Improving Privacy and Security in Multi-Authority Attribute-Based Encryption," in Proc. 16thACM Conf. Computer and Comm. Security (CCS’09), 2009, pp. 121-130.
  2. A.B. Lewko and B. Waters, "Decentralizing Attribute-Based Encryption," in Proc. Advances in Cryptology-EUROCRYPT’11, 2011, pp. 568-588.
  3. S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute Based Information Sharing with Attribute Revocation," in Proc. 5th ACM Symp.Information, Computer and Comm. Security (ASIACCS’10), 2010,pp. 261-270.
  4. M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, "Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption," IEEE Trans. Parallel Distributed Systems, vol. 24, no. 1, pp. 131-143, Jan. 2013.
  5. J. Hur and D.K. Noh, "Attribute-Based Access Control with Efficient Revocation in Information Outsourcing Systems," IEEETrans. Parallel Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011.
  6. S. Jahid, P. Mittal, and N. Borisov, "Easier: Encryption-Based Access7 Control in Social Networks with Efficient Revocation," inProc. 6th ACM Symp. Information, Computer and Comm. Security(ASIACCS’11), 2011, pp. 411-415.
  7. S. Ruj, A. Nayak, and I. Stojmenovic, "DACC: Distributed Access Control in Clouds," in Proc. 10th IEEE Int’l Conf. TrustCom, 2011,pp. 91-98.
  8. K. Yang and X. Jia, "Attribute-Based Access Control for Multi-Authority Systems in Cloud Storage," in Proc. 32th IEEEInt’l Conf. Distributed Computing Systems (ICDCS’12), 2012,pp. 1-10.
  9. D. Boneh and M.K. Franklin, "Identity-Based Encryption fromthe Weil Pairing," in Proc. 21st Ann. Int’l Cryptology Conf.: Advances in Cryptology - CRYPTO’01, 2001, pp. 213-229.
  10. A.B. Lewko and B. Waters, "New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques," in Proc. 32st Ann. Int’l Cryptology Conf.: Advances in Cryptology - CRYPTO’12, 2012, pp. 180-198

Publication Details

Published in : Volume 2 | Issue 5 | September-October 2017
Date of Publication : 2017-10-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 853-856
Manuscript Number : CSEIT1725178
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

B. K. N. Priyanka, R. Balamurugan, "Multilevel Attribute Based Encryption in Cloud", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.853-856, September-October-2017.
Journal URL : http://ijsrcseit.com/CSEIT1725178

Article Preview