Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,761 Hits in 4.8 sec

A Review Paper on an Efficient File Hierarchy Attribute Based Encryption Scheme in Cloud Computing

Shital Panchal, Kamthane, Shital Gaikwad
International Research Journal of Engineering and Technology (IRJET)   unpublished
In this paper an efficient file hierarchy attribute based encryption scheme is proposed.  ...  There are many encryption technologies used to share data securely. One of the best ways is CP-ABE is to solve challenging problem of secure data sharing scheme in cloud computing.  ...  In this study, an efficient encryption scheme based on layered model of the access structure is proposed in cloud computing, which is named file hierarchy CP-ABE scheme (or FH-CP-ABE, for short).  ... 
fatcat:apighp62bbc7zes4yzka65i6am

Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage

Praveen S. Challagidad, Mahantesh N. Birje
2020 Procedia Computer Science  
This paper proposes an efficient multi-authority access control using attribute-based encryption scheme that achieves efficient, fine grained access control.  ...  This paper proposes an efficient multi-authority access control using attribute-based encryption scheme that achieves efficient, fine grained access control.  ...  The efficiency and security of proposed scheme is measured by considering time consumption of encryption and decryption over 100 users, 20 attributes, 150 files (in MB of varying size) and 20 authorities  ... 
doi:10.1016/j.procs.2020.03.423 fatcat:okyp62ij2zgblord4znx3pmyki

An Improved Security enabled Distribution of Protected Cloud Storage Services by Zero-Knowledge Proof based on RSA Assumption

M. Sowmyavarshini, D. Palanikkumar, G. Rathi
2012 International Journal of Computer Applications  
In hierarchical identity-based architecture, the sender needs to encrypt a file only once and store only one copy of the corresponding ciphertext in a cloud.  ...  The efficient sharing of secure cloud storage services (ESC) scheme which allows the upper-level user to share the secure cloud storage services with multiple lower-level users.  ...  The concept of existing Attribute Based Encryption (ABE) [2] [6] [7] schemes can enable a sender to encrypt a message to multiple recipients in an efficient way.  ... 
doi:10.5120/4952-7198 fatcat:kuq73tbq4jg27nqprduiaih4p4

An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption

Palanikkumar D
2012 Bonfring International Journal of Research in Communication Engineering  
An efficient sharing of secure cloud storage services (ESC) scheme allows the users to share the messages in hierarchical order.  ...  This scheme allows the sender to participate in the partial signature, so as to reduce the computational cost.  ...  Liu et al., [15] described about an efficient privacy preserving keyword search scheme in cloud computing.  ... 
doi:10.9756/bijrce.1504 fatcat:naghlqgk3vblxaiuzq537mw23i

A Review on Access Control Policy and Key Generation in Data Sharing

Mr. Mangnale Gajanan K., Prof. Korde A. L., Dr R K Patil, Dr R K Sawant
2019 International Journal of Advanced Engineering Research and Science  
An Efficient File Hierarchy Attribute-Based Encryption Scheme: In this article, an efficient file hierarchy attribute-based encryption scheme is proposed [15] .  ...  In this study, an efficient encryption scheme based on layered model of the access structure is proposed in cloud computing, which is named file hierarchy CP-ABE scheme (or FH-CP-ABE, for short).  ... 
doi:10.22161/ijaers.6.2.6 fatcat:jghs5et6lbhxxjgd7e2c2d2cve

Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption

S. Saravanakumar, S. Chitra
2022 Computer systems science and engineering  
Furthermore, highly secure and flexible cipher text-based attribute access control with role hierarchy user grouping in cloud storage is implemented by extending the KUNodes (revocation) storage identity-based  ...  Unfortunately, an outsourced architecture applied with attribute-based encryption introduces numerous challenges, including revocation. This issue is a threat to the data security of DO.  ...  Lastly, computation efficiency is computed for the proposed system; it takes 23 sec in terms of attributes and 32 sec in terms of files.  ... 
doi:10.32604/csse.2022.019508 fatcat:nzq5lyfcozco5eapu3q6ywziwq

HASBE access control model with Secure Key Distribution and Efficient Domain Hierarchy for cloud computing

RajaniKanth Aluvalu, Vanraj Kamliya, Lakshmi Muddana
2016 International Journal of Electrical and Computer Engineering (IJECE)  
So encryption based on Attribute ("ABE"-"Attribute based encryption") has been offered for access control of subcontracted data in cloud computing with complex access control policies.  ...  In this paper, we had enhanced "Hierarchical attribute-set-based encryption" ("HASBE") access control with a hierarchical assembly of users, with flexible domain Hierarchy structure and Secure key distribution  ...  In "attribute based encryption" (ABE) scheme the data owner has to use user's PK ("Public Key") to encrypt data.  ... 
doi:10.11591/ijece.v6i2.8919 fatcat:3yv73zauevarbisn64jvtaqaee

Role Based Encryption with Efficient Access Control in Cloud Storage

2016 International Journal of Science and Research (IJSR)  
In this paper, a practical RBAC (Role Based Access Control) model is proposed to hold various security features like encryption, role management, role hierarchy, etc.  ...  RBAC is the method of coordinating access to computer according to individual roles of the user in an enterprise.  ...  CACH (Content Access Control in Hierarchy) Independent and dependent key approaches are included in this scheme. To encrypt the data there is no need of encryption key.  ... 
doi:10.21275/v5i2.nov161454 fatcat:niuvrs6yabcnvoe4nxyna2qb4m

Authorizing Identity based Integrity Auditing and Data Assigning with Responsive Information Hiding for Cloud

Siva Priya
2019 International Journal for Research in Applied Science and Engineering Technology  
This scheme makes the file stored in the cloud able to be shared and used by others on the condition that the sensitive information is hidden, which makes the auditing system to work in efficient manner  ...  Authorizing based on Identity-based cloud storage auditing schemes can check the security of cloud data. It contains the confidential information that must be protected from unauthorized access.  ...  However, the hierarchy structure of shared files has not been explored in CP-ABE. In this paper, an efficient file hierarchy attribute-based encryption scheme is proposed in cloud computing.  ... 
doi:10.22214/ijraset.2019.5485 fatcat:sxjnkcz775gkretr3owfzmgamm

A Survey on Hierarchical Attribute Set Based Encryption (HASBE) Access Control Model for Cloud Computing

Vanraj Kamliya, Rajnikanth Aluvalu
2015 Journal of Telematics and Informatics  
That's why the reason traditional access control is not enough For the High security .so that the attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing  ...  with the complex access control policy.in this paper, we have proposed hierarchical attribute-set-based encryption (HASBE) access control by extending cipher-text policy and attribute-set-based encryption  ...  security so that various Attribute based Encryption Scheme are proposed  ... 
doi:10.12928/jti.v3i1.22-27 fatcat:npbuzf63vrblrpymgqh2ttwcle

An Efficient File Hierarchy based E-System with Clinical Document Architecture in Cloud Computing

Archana. P, Prasanna. S
2018 International Journal of Trend in Scientific Research and Development  
Then the patient adopts CP-ABE scheme to encrypt the information m1 and m2 by different access policies based on the actual need. Also we propose The Clinical Document Architecture (CDA).  ...  They collect the real time personal information (PHI) and patient's physical problem and transmitted it to the healthcare provider. share the PHR information in cloud computing, a patient divides his PHR  ...  CONCULSION AND FUTURE WORK In this project, a secure and efficient privacypreserving dynamic medical text mining and image feature extraction scheme PPDM and File Hierarchy in cloud-assisted e-healthcare  ... 
doi:10.31142/ijtsrd10785 fatcat:r35em5ncdregrkcpew3wn7uuqm

Encryption Based Access Control Model In Cloud: A Survey

Rachana Chavda, Rajanikanth Aluvalu
2015 Journal of Telematics and Informatics  
In this paper we will be reviewing various encryption based access control model for enhancing cloud security along with their limitations.  ...  Cloud computing is known as "Utility". Cloud computing enabling users to remotely store their data in a server and provide services on-demand.  ...  Efficient User Revocation To deal with user revocation in cloud computing, we add an attribute to each user's key and employ multiple value assignments for this attribute.  ... 
doi:10.12928/jti.v3i1.15-21 fatcat:62as2xyhvze45gbj4x7deljt3u

Comparative Analysis of Compression Techniques and Feature Extraction for Implementing Medical Image Privacy Using Searchable Encryption [chapter]

J. Hyma, P. V. G. D. Prasad Reddy, A. Damodaram
2015 Advances in Intelligent Systems and Computing  
That's why the reason traditional access control is not enough For the High security .so that the attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing  ...  with the complex access control policy.in this paper, we have proposed hierarchical attribute-set-based encryption (HASBE) access control by extending cipher-text policy and attribute-set-based encryption  ...  security so that various Attribute based Encryption Scheme are proposed  ... 
doi:10.1007/978-3-319-13728-5_7 fatcat:eboezx4bfzantbrbfkab2rcsne

K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access [chapter]

Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Two cryptographic libraries, Hierarchical Identity-Based Encryption and Key-Policy Attribute-Based Encryption, developed in this project are useful beyond the specific cloud security problem studied.  ...  Security and privacy concerns hinder the adoption of cloud storage and computing in sensitive environments.  ...  Key-Policy Attribute-Based Crypto Library To support lazy-revocation and hierarchies, K2C uses our AB-HKU scheme that is based on Key-Policy Attribute-Based encryption scheme [21] .  ... 
doi:10.1007/978-3-642-31909-9_4 fatcat:2fqltq5pybcuplaibq5wmy4ukq

Cryptographic Algorithms for Efficient and Secure Data Sharing in Cloud Storage
IJARCCE - Computer and Communication Engineering

Shweta. P. Tenginkai, Vani K. S
2015 IJARCCE  
In this paper, we explore the various encryption schemes which were proposed to solve this problem.  ...  With the introduction of encryption and decryption schemes, the storing, sharing and securing of data became rampant.  ...  The encryption type used here is public key system. E. Attribute Based Encryption Schemes Attributes play a very critical role in Attribute-based Encryption (ABE) scheme.  ... 
doi:10.17148/ijarcce.2015.4260 fatcat:tap54egks5ezdjenaw55vctt3q
« Previous Showing results 1 — 15 out of 2,761 results