A Survey on Secure User Data Transaction using Attribute - Based Encryption Scheme over Cloud Data

Authors

  • Navin Sethiya  UG Students, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India.
  • Hrishikesh Patel  UG Students, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India.
  • Akshay Harshe  UG Students, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India.
  • Alekh Gaigole  UG Students, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India.
  • Harshvardhan Donadkar  UG Students, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India.
  • Prof. Priya Karemore  Assistant Professor, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India.

Keywords:

Attribute-Based Encryption, Attributes Revocation, Fine-Grained Access Control, Keywords Search, Mobile Cloud Storage.

Abstract

Cloud computing is an innovation which utilizes the Internet to store, oversee, and register the information, as opposed to a nearby server or a PC. Clients can access the cloud condition wherever they need on compensation for each utilization way. Transferring of delicate information on un-believed servers in the cloud is a testing assignment. Established encryption procedures are utilized when the re-appropriating of information in the cloud to give access control and secrecy. Access control instruments are not doable in the cloud as a result of the absence of adaptability, versatility, and fine-grained access control. As an option, So, Attribute-Based Encryption (ABE) procedures are acquainted in the cloud with increment the security and adaptability. Attribute-based encryption is an open key cryptographic strategy in which the private key and figure content are based on the attributes. ABE involves IBE, KP-ABE, and CP-ABE. In Identity-Based Encryption (IBE) the mystery key and the attributes are based on the character of the client. In Ciphertext-Policy Attribute-Based Encryption (CP-ABE) a mystery key is gotten from the arrangement of attributes and the access strategy is defined over the universe of attributes inside the framework. In Key Policy – Attribute-Based Encryption (KP – ABE) the figure content is related to the arrangement of attributes and the mystery key is based on the access structure. This paper is a study of all ABE strategies and specialty an evaluation table about ABE keys job in cloud condition.

References

  1. Muhammad Yasir Shabir, Asif Iqbal, Zahid Mahmood and Ataullah Ghafoor, Analysis of Classical Encryption Techniques in Cloud Computing, IEEE Tsinghua Science & Technology, Vol.21, February 2016.
  2. A.Sahai and B.Waters, Fuzzy identity based encryption, in Proc. Advances in Cryptology – Eurocrypt, 2005, pp.457-473.
  3. Adi Shamir. Identity-based cryptosystems and signature schemes, in Proc. of CRYPTO 84 on Advances in cryptology, pages 47–53. SpringerVerlag New York, Inc., 1985.
  4. V.Goyal, O.Pandey, A.Sahai and B.Waters, Attribute based encryption for fine grained access control of encrypted data, in proc. ACM conf. computer and communications, 2006.
  5. J.Bethencourt, A.Sahai, and B.Waters, Ciphertext policy attribute based encryption, in proc. IEEE symposium security and privacy, 2007.
  6. K.Meena,S.Vinodhini, T.Pallavi & R.Vasugi,” Surveillance Based Gcm Home Security System Using Object Motion Detection”,International Innovative Research Journal of Engineering and Technology,pp.44-47,2016.
  7. S.Rifki, Y.Park, and S.Moon, A fully secure ciphertext policy attribute based encryption with a tree-based access structure, Journal of Information Science and Engineering, Vo.31, pp.247-265,2015.
  8. G.Wang, Q.Liu and J.Wu, Hierarchical attribute based encryption for fine grained access control in cloud storage services, in Proc. ACM conf. computer and communication security, 2010.
  9. K.Yang, X.Jia, K.Ren and B.Zhang, Dac-Macs: Effective data access control for multiauthority cloud storage systems, in Proc. Of IEEE Infocom, 2013.
  10. Shulan Wang, Junwei Zhou, Joseph K.Liu, Jianping Yu, Jianyong Chen and Weixin Xie, An efficient file hierarchy attribute based encryption scheme in cloud computing, IEEE Transactions on information forensics and security, Vol. 11, No.6, June 2016.
  11. Ximeng Liu, Jiafeng Ma, Jinbo Xiong, Qi Li, Jun Ma, Ciphertext – policy weighted attribute based encryption for fine grained access control, International conference on Intelligent networkings and collaborative systems, 2013.
  12. Shulan Wang, Kaitai Liang, Joseph K.Liu, Jianyong Chen, Jianping Yu, Weixin Xie, Attribute based data sharing scheme revisited in cloud computing, IEEE Transactions on information forensics and security, Vol.11, No.8, August 2016.
  13. G.K.Sandhia, G.K.Bhaskar, secure data sharing using attribute based encryption in cloud computing, Journal of Chemical & Pharmaceutical Sciences, Vol.9, December 2016.

Downloads

Published

2019-02-28

Issue

Section

Research Articles

How to Cite

[1]
Navin Sethiya, Hrishikesh Patel, Akshay Harshe, Alekh Gaigole, Harshvardhan Donadkar, Prof. Priya Karemore, " A Survey on Secure User Data Transaction using Attribute - Based Encryption Scheme over Cloud Data, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.433-437, January-February-2019.