Cipher Text-Policy Attribute-Based Encryption

Authors

  • G. Swetha  Assistant Professor, Department of Information Technology in Teegala Krisha Reddy Engineering College, Telangana, India
  • P. Sindhuja  UG Scholar, Department of Information Technology in Teegala Krisha Reddy Engineering college, Telangana, India
  • P. SaiTeja  UG Scholar, Department of Information Technology in Teegala Krisha Reddy Engineering college, Telangana, India
  • T. Thushara Devi  UG Scholar, Department of Information Technology in Teegala Krisha Reddy Engineering college, Telangana, India

Keywords:

Encrypted Data, Authorized Users.

Abstract

This paper review on security of data stored in public cloud. This can be achieved by using encryption and decryption mechanism. The data owner can store the encrypted data within the cloud. Then the owner can issue the decryption keys to the authorized users. Based on this scheme data owners can easily share the data to intended users. Extensive number of users are trying to access data stored in the cloud simultaneously, it leads to new challenges mainly on confidentiality and integrity of data stored in cloud.

References

  1. K.Yang, X.Jia, K.Ren, B.Zhang and R.Xie,”DAC-MACS: Effective data access control for multi authority cloud storage systems,”IEEE transactions on information Forensics & Security, vol. 7, 2012
  2. Ming Li,Shucheng Yu,Yao Zheng,Kui Ren,Wenjing Lou, “Scalable and secure sharing of personal heath records in cloud computing using attribute based encryption,”IEEE transactions on parallel and distributed systems, vol 24, 2013
  3. Elli Androulaki,Claudio Soriente,Luka malisa & Srdjan Capkun, ”Enforcing location and time based access controlon cloud stored data,IEEE 34 th international conference on Distributed computing systems,2014.
  4. Baishuang Hu, Qin Liu,Xuhui Liu,Tao Peng,Guojun Wang & Jie wu, ”DABKS:Dynamic attributebased Keyword search in cloud computing”,IEEE communication and information systems security symposium,2017
  5. Quin Liu, Guojun Wang, & Jie wu,”Clock based proxy Re-encryption scheme in unreliable cloud,”IEEE 41st international conference on parallel processing workshops, 2012
  6. Kan Yang, he Liu, Xiao Hua jia, “Time domain attribute based access control for cloud based video content sharing: A cryptographic approach, IEEE transaction on Multimedia, vol 18, 2016
  7. Kui Ren, Cong Wang & Quian Wang, “Security Challenges for the Public Cloud, IEEE Computer Society, Jan2012
  8. Cong Wang, Quian Wang & Kui Ren, ”Privacy preserving public auditing for data Storage Security in cloud Computing”,IEEE communication society,2010.
  9. J.Bethencourt,A Sahai andb.Waters “cipher text Policy Attribute based encryption,” In proceeding of the 28thIEEE symposium on security and privacy,IEEE 2007.
  10. R.L Rivest, A.Shamir and D.a Wagner,”Time lock puzzles and timed release Crypto,”Massachusets Institute of Technology, 1996
  11. Gartner Inc: Gartner identifies the Top 10 strategic technologies for 2011. Online. Available: . Accessed: 15-Jul-2011 http://www.gartner.com/it/page.jsp?id=1454221 Online. Available: . Accessed: 15-Jul-2011
  12. Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye X, Tang N: Cloud Computing: A Statistics Aspect of Users. In First International Conference on Cloud Computing (CloudCom), Beijing, China. Heidelberg: Springer Berlin; 2009:347–358.Google Scholar
  13. Zhang S, Zhang S, Chen X, Huo X: Cloud Computing Research and Development Trend. In Second International Conference on Future Networks (ICFN’10), Sanya, Hainan, China. Washington, DC, USA: IEEE Computer Society; 2010:93–97.View ArticleGoogle Scholar
  14. Cloud Security Alliance: Security guidance for critical areas of focus in Cloud Computing V3.0.. 2011. Available:
  15. Marinos A, Briscoe G: Community Cloud Computing. In 1st International Conference on Cloud Computing (CloudCom), Beijing, China. Heidelberg: Springer-Verlag Berlin; 2009.Google Scholar

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
G. Swetha, P. Sindhuja, P. SaiTeja, T. Thushara Devi, " Cipher Text-Policy Attribute-Based Encryption, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.989-993, March-April-2018.