Effectual Discover And Contrary Of Put Via Cipher Text Data In The Cloud

MOHAMMED MUSTAFA, G DHAYAKAR

Abstract


A cloud-based file encryption scheme is proposed for files in the cloud. We recommend the types of layers for access multiple architectures to resolve the problem of multiple series files discussed. We are conducting and implementing a comprehensive experience for the H-Club Penguin-ABE Plan. The cost of the current system is high, coding time is high, some time to understand the system, and the cost of the account is high. Layered access structures are incorporated into only one access structure, after which, sequential files are encrypted using the integrated access structure. Attributes can be shared by top text component files. The Club Penguin-ABE is more suitable for many use plans and therefore for general purposes. Multiple series files that are discussed are resolved using a layer type access structure. In the proposed system, both the top text storage and the time encoding values ​​of the files are saved. As the size of the files grows, the benefits of our plan become more apparent. Therefore, both zero text storage is saved and the cost time for encoding files. In addition, the proposed plan proved to be safe under the standard concept.


References


Y. Yang, J. K. Liu, K. Liang, K.-K. R. Choo, and J. Zhou, “Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data,” in Proc. 20th Eur. Symp. Res. Comput. Secur. (ESORICS), vol. 9327. Sep. 2015, pp. 146–166.

Z. Wan, J. Liu, and R. H. Deng, “HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743–754, Apr. 2012.

X. Liang, Z. Cao, H. Lin, and D. Xing, “Provably secure and efficient bounded cipher text policy attribute based encryption,” in Proc. 4th Int. Symp. Inf., Comput., Commun. Secur., Mar. 2009, pp. 343–352.

T. Jiang, X. Chen, J. Li, D. S. Wong, J. Ma, and J. Liu, “TIMER: Secure and reliable cloud storage against data re-outsourcing,” in Proc. 10th Int. Conf. Inf. Secur. Pract. Exper., vol. 8434. May 2014, pp. 346–358.

Shulan Wang, Junwei Zhou, Member, IEEE, Joseph K. Liu, Member, IEEE,Jianping Yu, Jianyong Chen, and WeixinXie, “An Efficient File Hierarchy Attribute-BasedEncryption Scheme in Cloud Computing”, ieee transactions on information forensics and security, vol. 11, no. 6, june 2016.

L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated cipher text-policy attribute-based encryption and its application,” in Proc. 10th Int. Workshop Inf. Secur. Appl., Aug. 2009, pp. 309–323.

S. Hohenberger and B. Waters, “Online/offline attribute-based encryption,” in Proc. 17th Int. Conf. Pract. Theory Public-Key Cryptogr. (PKC), vol. 8383. Mar. 2014, pp. 293–310.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.