Open Access   Article Go Back

KDC Based KP-ABE for Data Encryption in Cloud

Reenu Lathwal1 , Vinod Kumar Saroha2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-4 , Page no. 30-37, Apr-2015

Online published on May 04, 2015

Copyright © Reenu Lathwal , Vinod Kumar Saroha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Reenu Lathwal , Vinod Kumar Saroha, “KDC Based KP-ABE for Data Encryption in Cloud,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.4, pp.30-37, 2015.

MLA Style Citation: Reenu Lathwal , Vinod Kumar Saroha "KDC Based KP-ABE for Data Encryption in Cloud." International Journal of Computer Sciences and Engineering 3.4 (2015): 30-37.

APA Style Citation: Reenu Lathwal , Vinod Kumar Saroha, (2015). KDC Based KP-ABE for Data Encryption in Cloud. International Journal of Computer Sciences and Engineering, 3(4), 30-37.

BibTex Style Citation:
@article{Lathwal_2015,
author = {Reenu Lathwal , Vinod Kumar Saroha},
title = {KDC Based KP-ABE for Data Encryption in Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2015},
volume = {3},
Issue = {4},
month = {4},
year = {2015},
issn = {2347-2693},
pages = {30-37},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=457},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=457
TI - KDC Based KP-ABE for Data Encryption in Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - Reenu Lathwal , Vinod Kumar Saroha
PY - 2015
DA - 2015/05/04
PB - IJCSE, Indore, INDIA
SP - 30-37
IS - 4
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2919 2638 downloads 2539 downloads
  
  
           

Abstract

There are lots of cipher-text policies to provide control access mechanism. Attribute-based encryption reconsiders the concept of public-key encryption in which the secret key of a user and the ciphertext are dependent upon attributes. In this, the decryption of a ciphertext is possible if the set of attributes of the user key matches the attributes of the ciphertext. File distribution and sharing is the most commonly used services in the cloud computing. Attribute based encryption is the attractive way to manage and control file sharing in cloud with its special attribute computing properties. Attribute-based encryption (ABE) is a new cryptographic primitive which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. The authors take a centralized approach where a key distribution center (KDC) distributes secret keys and attributes to all users. Cloud computing is a new concept of computing technique, by which computer resources are provided dynamically via internet. Decentralized scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme supports creation, modification, and reading the data stored in cloud and also provide the decentralized authentication and robust. It can be comparable to centralized schemes for the communication of data, computation of data, and storage of data.

Key-Words / Index Term

Access Control, Cloud Computing, Data Privacy, Fine-Grained Access Control, Attribute-Based Encryption, Ciphertext Policy

References

[1]. M. Suriyapriya, A. Joicy,” Attribute Based Encryption with Privacy Preserving In Clouds”, International Journal on Recent and Innovation Trends in Computing and Communication, Volume 2 Issue 2, February 2014,
[2]. Changji Wang, Jianfa Luo,” An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length” Mathematical Problems in Engineering Volume 2013
[3]. Taeho Jung , Xiang-Yang Li , Zhiguo Wan,” Privacy Preserving Cloud Data Access With Multi-Authorities” arXiv:1206.2657v6 [cs.CR] 11 Apr 2013
[4]. Geetanjali. M, Saravanan. N,” Attribute Based Encryption with Privacy Protection in Clouds” International Journal of Innovative Research in Computer and Communication Engineering, Vol.2, Special Issue 1, March 2014
[5]. Jinguang Han, Student Member, IEEE, Willy Susilo, Senior Member, IEEE, ” Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption”. IEEE Transactions on Parallel And Distributed Systems Vol.23 No.11, 2012
[6]. Moligi Sangeetha,” Simulation of Secure Data Sharing Scheme for Dynamic Groups in Cloud” International Journal of Computer Engineering and Applications, Volume VII, Issue II, August 14
[7]. M. Vijayapriya, Dr. A. Malathi,” On Demand Security for Personal Health Record in Cloud Computing Using Encryption and Decryption Cryptography” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 9, September 2013
[8]. A.Vijayalakshmi, R.Arunapriya,” Authentication of Data Storage Using Decentralized Access Control In Clouds” JGRCS, Volume 5, No. 9, September 2014
[9]. Geetanjali.M, Saravanan.N, “ attribute based encryption with privacy protection in clouds” IJIRCCE, Vol.2, special issue 1, march 2014
[10]. Moligi Sangeetha, “simulation of secure data sharing scheme for dynamic groups in cloud” IJCEA, Vol.7, issue 2, august 2014
[11]. E. Kamalakannan, Arvind .K.S,” Investigation on Improving the Security of Public Health Record System in Cloud Computing” International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 8, October 2013
[12]. M. Suriyapriya, A. Joicy, “attribute based encryption with privacy preserving in clouds”, IJRITCC, VOL.2, Issue 2, Feb. 2014.
[13]. A.Malathi, M.vijayapriya, “on demand security for personal health record in cloud computing using encryption and decryption cryptography”, IJARCSSE, Vol. 3, Issue 9, sep.2013.
[14]. A.Vijayalakshmi, R.Arunapriya, “authentication of data storage using decentralized access control in clouds”, JGRCS,Vol.5, No.9, sep. 2014.
[15]. Minu George, Dr. C.Suresh Gnanadhas, Saranya.K,” A Survey on Attribute Based Encryption Scheme in Cloud Computing”IJARCCE, Vol.2, issue 11, nov.2013.
[16]. M. Suriyapriya, A. Joicy, “Attribute Based Encryption with Privacy Preserving In Clouds”, IJRITCC, Vol.2, issue 2, feb.2014.
[17]. Cheng-Chi Lee, Pei-Shan Chung, and Min-Shiang Hwang,” A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments”, International Journal of Network Security, Vol.15, No.4, PP.231-240, July 2013.
[18]. Vipul goyal, omkant pandey, “attribute-based encryption for fine-grained access control of encryption data”.