IJSTE

CALL FOR PAPERS : Sep 2017

Submission Last Date
25-Sep--17
Submit Manuscript Online

FOR AUTHORS

FOR REVIEWERS

ARCHIEVES

DOWNLOADS

Open Access



CopyScape
Creative Commons License

Digital Data Encryption Using Cloud


Author(s):

Amruta Mane , Trinity College Of Enggineering And Research; Amruta Mane, Trinity College Of Enggineering And Research; Neha More, Trinity College Of Enggineering And Research; Shraddha Khamkar, Trinity College Of Enggineering And Research; Poonam Kolate, Trinity College Of Enggineering And Research

Keywords:

Identity-based; access control; rating system; cipher text-policy attribute-based encryption

Abstract:

Main aim of Identity -Based Access Control project is to store the important data from cloud. This mechanism is to carry out the rating system for preventing specific digital content like (audio, video, images etc) from being obtained by appropriate users. We introduce an access-control technique that we refer to as attribute-based encryption (ABE). An extension of the cryptographic technique of identity-based encryption (IBE), our proposed ABE scheme can serve as the basis of an access-control architecture where interaction is not require for entities with a trusted authority in order to gain access to sensitive data.In this paper, we proposed an identity based access control approach for digital content based on cipher text-policy attribute-based encryption. Only one copy of encrypted digital content is required to share with multiple users. In this paper we represent a system for realizing complex access control on encrypted data that we call Cipher text-Policy Attribute-Based Encryption. By using such techniques encrypted data can be kept confidential even if the storage server is untrusted; Previous Attribute- Based Encryption systems used attributes to describe the encrypted data and built policies into user’s keys; while in our system attributes are used for describing a user’s credentials, and a party for encrypting data determines a policy for who can decrypt. We present a new methodology for realizing Cipher-text Policy Attribute Encryption (CP-ABE) under concrete and non-interactive cryptographic assumptions in the standard model. Our solutions allow any encrypt to specify access control in terms of any access formula over the attributes in the system.As shown in our performance analysis with respect of security, space complexity, and time complexity, identity-based access control outperforms the traditional access control list based and encryption-based access control approaches.


Other Details:

Manuscript Id :IJSTEV2I9054
Published in :Volume : 2, Issue : 9
Publication Date: 01/04/2016
Page(s): 116-122
Download Article

IMPACT FACTOR

3.905

NEWS & UPDATES

Submit Article

Dear Authors, You can submit your article to our journal at the following link: http://www.ijste.org/Submit

Impact Factor

The Impact Factor of our Journal is 4.753 (Year - 2016)
3.905 (Year - 2015) 2.895(Year -2014)

Click Here

Submit Payment Online

Dear Authors, Now you can submit the payment receipt to our journal online at the following link: index.php?p=Payment

IC Value

ThVe IC Value of our journal is 62.78
Click Here

GLOBAL INDEXING



















Computer Science Directory. We are listed under Computer Research Institutes category

Share on Social media

Home | Privacy Policy | Terms & Conditions | Refund Policy | Feedback | Contact Us
Copyright © 2014 ijste.org All rights reserved