Multilevel Attribute Based Encryption in Cloud

Authors

  • B. K. N. Priyanka  M.Tech Scholar, Department of Computer Science & Engineering, Bharat Institute of Engineering &Technology, Hyderabad, India
  • R. Balamurugan  Associate Professor, Department of Computer Science &Engineering, Bharat Institute of Engineering &Technology, Hyderabad, India

Keywords:

Cloud Computing, Data Sharing, ?le Hierarchy, Ciphertext-Policy, Attribute-Based Encryption

Abstract

Disseminated registering is a rising preparing perspective engaging clients to remotely keep their certainties in a server and give on-ask for offices. With the improvement of sharing mystery organization data on cloud the server records security and assurance transformed into the key issues for distant realities accumulating. Secure utilizer approved data get the chance to control machine ought to be given ahead of time of cloud utilizer has the flexibility to outsource touchy data to the cloud for the limit. In the show, various cryptographic estimations are utilized for encryption of the actualities. In this paper, we can observe sundry plans for encryption and feasible answers for their circumscriptions that involve of Attribute predicated encryption(ABE), Key approach Attribute predicated encryption(KP-ABE), Cipher content Attribute predicated encryption(CP-ABE), non-monotonic motivate admission to structure, Hierarchical Attribute predicated encryption(HABE), Different expert Attribute predicated encryption(MA-ABE).

References

  1. M. Chase and S.S.M. Chow, "Improving Privacy and Security in Multi-Authority Attribute-Based Encryption," in Proc. 16thACM Conf. Computer and Comm. Security (CCS’09), 2009, pp. 121-130.
  2. A.B. Lewko and B. Waters, "Decentralizing Attribute-Based Encryption," in Proc. Advances in Cryptology-EUROCRYPT’11, 2011, pp. 568-588.
  3. S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute Based Information Sharing with Attribute Revocation," in Proc. 5th ACM Symp.Information, Computer and Comm. Security (ASIACCS’10), 2010,pp. 261-270.
  4. M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, "Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption," IEEE Trans. Parallel Distributed Systems, vol. 24, no. 1, pp. 131-143, Jan. 2013.
  5. J. Hur and D.K. Noh, "Attribute-Based Access Control with Efficient Revocation in Information Outsourcing Systems," IEEETrans. Parallel Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011.
  6. S. Jahid, P. Mittal, and N. Borisov, "Easier: Encryption-Based Access7 Control in Social Networks with Efficient Revocation," inProc. 6th ACM Symp. Information, Computer and Comm. Security(ASIACCS’11), 2011, pp. 411-415.
  7. S. Ruj, A. Nayak, and I. Stojmenovic, "DACC: Distributed Access Control in Clouds," in Proc. 10th IEEE Int’l Conf. TrustCom, 2011,pp. 91-98.
  8. K. Yang and X. Jia, "Attribute-Based Access Control for Multi-Authority Systems in Cloud Storage," in Proc. 32th IEEEInt’l Conf. Distributed Computing Systems (ICDCS’12), 2012,pp. 1-10.
  9. D. Boneh and M.K. Franklin, "Identity-Based Encryption fromthe Weil Pairing," in Proc. 21st Ann. Int’l Cryptology Conf.: Advances in Cryptology - CRYPTO’01, 2001, pp. 213-229.
  10. A.B. Lewko and B. Waters, "New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques," in Proc. 32st Ann. Int’l Cryptology Conf.: Advances in Cryptology - CRYPTO’12, 2012, pp. 180-198

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
B. K. N. Priyanka, R. Balamurugan, " Multilevel Attribute Based Encryption in Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.853-856, September-October-2017.