Filters








18,464 Hits in 3.2 sec

Attribute based Encryption in Cloud Computing – A Review

B. Firdaus Begam, M. Sasiskala
2021 International Journal of Computer Applications  
In this paper, Attribute Based Keyword Search over encrypted data in cloud are discussed which provides security over searching of data based on keyword.  ...  Identity-Based Cryptography Identity-Based cryptography mechanism is used for securing cloud data using attribute-based approach.  ...  Identity based Cryptography Key Policy Attribute Based Encryption (KP-ABE) In KP-ABE approach, attribute policies are associated with keys and data is associated with attributes.  ... 
doi:10.5120/ijca2021921084 fatcat:xw6hkwy3pje4vejaj5g62smoy4

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

2015 International Journal of Science and Research (IJSR)  
ABE is a public-key based one to many encryption methodologies which allows users to encrypt and decrypt data based on user attributes.  ...  To handle these security problems, various schemes based on the Attribute-Based Encryption have been proposed recently.  ...  Attribute Based Encryption (ABE) Few years later, Fuzzy Identity-Based Encryption [6] is proposed, which is also known as Attribute-Based Encryption (ABE).  ... 
doi:10.21275/v4i11.nov151519 fatcat:y66zekzkorfz3efh2byxm6b62u

Role Based Secured Access Of Data In Clouds

R. Saravana Kumar, Dr. P. Suresh
2017 Zenodo  
A identity-based proxy re-encryption scheme has been used in order to provide a comprehensive and feasible solution for data centric-approach.  ...  Attribute-based access control defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together.  ...  A data-centric approach is used for data self-protection, where novel cryptographic techniques such as Proxy Re-Encryption Identity-Based Encryption and Identity-Based Proxy Re-Encryption are used.  ... 
doi:10.5281/zenodo.438627 fatcat:pvziuhq6pjfgxc4yn2v6ifwaoy

A Novel Monarch Butterfly Optimization with Attribute based Encryption for Secure Public Cloud Storage

Nagarajan G, Dr. K Sampath Kumar
2021 Indian Journal of Computer Science and Engineering  
Therefore, this paper presents a novel monarch butterfly optimization with attribute based encryption (MBO-ABE) technique for secure public cloud storage.  ...  For improving the security performance of the ABE technique, the MBO manner is applied to it which is based on the migration of monarch butterflies.  ...  Attribute-based encryption (ABE) is a common cryptographic method for protecting the security of user's data in CC.  ... 
doi:10.21817/indjcse/2021/v12i4/211204232 fatcat:uknqto5rfjfprfafu3kq5srh4m

Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records

Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker
2010 International Journal of Computational Models and Algorithms in Medicine  
In this paper we propose a new encryption technique called a type-and-identity-based proxy reencryption scheme which is suitable to be used in the healthcare setting.  ...  This implies that data remains confidential even if the database maintained by the third party is compromised.  ...  We propose a type-and-identity-based proxy re-encryption scheme which consists of six algorithms : Setup , Extract , Encrypt , Pextract , Figure 2: Identity-Based Encryption Identity-Based Encryption  ... 
doi:10.4018/jcmam.2010040101 fatcat:sdcgkt24tjf5rc5ovxxknotaru

Secure Sharing Of Data In Cloud Using Attribute Based Proxy Re-Encryption

U.Aarthi*, Mr. N. Praveen
2016 Zenodo  
The objective of this project is to provide security in Cloud storage by using Attribute based proxy re-encryption which can be applicable to many real world applications.  ...  We showed that PEKS implies Identity Based Encryption, currently an open problem. Our constructions for PEKS are based on recent IBE constructions.  ...  four steps scheme where the algorithms are,(1) Setup.( 2 ) Private key Generation (3) Encryption (4) Decryption .In fuzzylogic identity based encryption view identities as a set of attributes.  ... 
doi:10.5281/zenodo.51466 fatcat:tjn52gk2uzd4hjohgsuoyiyp7q

Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing

K. V. Uma Maheswari, Dr. Dhanaraj Cheelu
2021 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Unfortunately, when sharing the data in a group while preserving data, identity privacy is still a challenging issue due to frequent change in membership.  ...  The storage overhead and encryption computation cost are dependent on the number of revoked users.  ...  This imply that revocation of any attribute or any single user in an quality group would We proposed a secure provenance scheme based on the ciphertext-policy attribute-based encryption technique  ... 
doi:10.32628/cseit2172846 fatcat:dfkinzufdra7pbhkzug4hhievy

Secure Data Retrieval based on Attribute-based Encryption in Cloud

Chaudhari Swapnil, Mandre B.R.
2016 International Journal of Computer Applications  
Attribute based encryption policy provides efficient encryption of data.  ...  This paper describes the implementation of Hierarchical attribute base encryption scheme on cloudsim tool. Implementing attribute based encryption where rijndael algorithm used to encrypt data.  ...  Attribute based encryption was initially introduced by Sahai and waters [3] , it was new method which used fuzzy identity based encryption .In the ABE scheme, in with ciphertexts are never encrypted to  ... 
doi:10.5120/ijca2016908166 fatcat:6xrjbgkbe5dvjbm6thbnpe7gau

Remarks on the Cryptographic Primitive of Attribute-based Encryption [article]

Zhengjun Cao, Lihua Liu
2014 arXiv   pre-print
Attribute-based encryption (ABE) which allows users to encrypt and decrypt messages based on user attributes is a type of one-to-many encryption.  ...  Unlike the conventional one-to-one encryption which has no intention to exclude any partners of the intended receiver from obtaining the plaintext, an ABE system tries to exclude some unintended recipients  ...  There are two type of attribute-based encryptions, ciphertext-policy attribute-based encryption (CP-ABE) and key-policy attribute-based encryption (KP-ABE).  ... 
arXiv:1408.4846v1 fatcat:y2pjpc3pqnchlio7meyvb5plgu

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

N. S.JeyaKarthikka, S. Bhaggiaraj, V. Sumathy
2014 International Journal of Computer Applications  
Although traditional attribute based encryption technique allow users to securely search the data by using keywords, they support only Boolean search and are not yet sufficient to meet the effective data  ...  However, to protect the secret data, sensitive information in cloud first the data has to be encrypted before outsourced to the commercial public cloud. It is a very challenging task.  ...  Attribute-Based Encryption (ABE) Attribute-based encryption [8] was firstly introduced by Sahai and Waters, in which they suggested that one's identity can be viewed as a combination of several attributes  ... 
doi:10.5120/15873-4885 fatcat:kgkheag6qjemvcukgmlj5ph26a

Function-Private Subspace-Membership Encryption and Its Applications [chapter]

Dan Boneh, Ananth Raghunathan, Gil Segev
2013 Lecture Notes in Computer Science  
While Boneh et al. showed how to construct function-private identity-based encryption (which implies predicate-private encrypted keyword search), searchable encryption typically requires a richer set of  ...  Among our applications, we significantly improve the function privacy of the identity-based encryption schemes of Boneh et al.: whereas their schemes are function private only for identities that are highly  ...  They presented a framework for modeling function privacy, and constructed various function-private anonymous identity-based encryption schemes (which, in particular, imply public-key keyword-private searchable  ... 
doi:10.1007/978-3-642-42033-7_14 fatcat:jta3wmrqtre53fyyas5tieb5tq

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption

R. Saikeerthana, A. Umamakeswari
2015 Indian Journal of Science and Technology  
Ciphertext Policy Attribute Based Encryption is a proficient technique for addressing this security issue, in which the owner of the data will create a control structure for encrypting the information.  ...  Decryption is possible when the peculiar attributes of the users satisfies that access control tree. Private keys for the users will be generated based on the attributes of the users.  ...  ABE is developed based on the stimulus of IBE 7 (Identity Based Encryption) which is otherwise called as Fuzzy IBE.  ... 
doi:10.17485/ijst/2015/v8is9/65600 fatcat:bzafk7nkmvd37idn44zrekheby

Proxy Re-encryption Schemes for Secure Cloud Data and Applications: A Survey

Raghi Roy, Paul P.
2017 International Journal of Computer Applications  
privacy, robustness and access control.In this paper the proxy re-encryption(PRE) schemes, Conditional PRE,Identity based PRE and Broadcast PRE,Type based PRE, Key private PRE,Attribute based PRE,Threshold  ...  There are many encryption schemes that provide security and access control over the network.Proxy re-encryption enables the semi-trusted proxy server to re-encrypt the ciphertext encrypted under Alice's  ...  Attribute based encryption is a generalized form of IBE.Two types of attribute based encryption (ABE) namely ciphertext policy attribute based encryption (CP-ABE) and key policy attribute based encryption  ... 
doi:10.5120/ijca2017913642 fatcat:ebvslla3v5du5bzytodxwpygsm

Improved Security of Audit Trail Logs in Multi-Tenant Cloud Using ABE Schemes

Bhanu Prakash, Nalini N
2014 International Journal of Advanced Computer Science and Applications  
In this paper we evaluate certain Identity-Based and Attribute-Based Encryption schemes and provide detailed analysis on performance.  ...  Keywords-multi-tenancy; audit-trail log; attribute-based encryption; reverse proxy security I.  ...  Later attribute based encryption was extended to distributed identities and hierarchical attribute based encryption schemes.  ... 
doi:10.14569/ijacsa.2014.051120 fatcat:grd45idsj5dffff3kczh7c4iva

Functional Encryption and Its Impact on Cryptography [chapter]

Hoeteck Wee
2014 Lecture Notes in Computer Science  
Functional encryption is a novel paradigm for public-key encryption that enables both fine-grained access control and selective computation on encrypted data, as is necessary to protect big, complex data  ...  In this article, we provide a brief introduction to functional encryption, and an overview of its overarching impact on the field of cryptography. ⋆ wee@di.ens.fr. CNRS (UMR 8548) and INRIA.  ...  Together, attribute-based and functional encryption constitute a crisp generalization of several advanced notions of encryption, such as broadcast and identity-based encryption as well as searching on  ... 
doi:10.1007/978-3-319-10879-7_18 fatcat:xpqhqqqjcnaddkdqwcvjpzcztu
« Previous Showing results 1 — 15 out of 18,464 results