A Threshold Multi-Authority Access Control System
Journal: International Journal of Computer Techniques (Vol.3, No. 4)Publication Date: 2016-07-01
Authors : - Immanuel Joshua Paul B.Prashanth V.Kameshwaran Ezhil Dyana;
Page : 55-59
Keywords : Keywords — Bit-Exchange based encryption; Attribute Based Encryption(ABE); Threshold Secret Sharing(t; n).;
Abstract
Bit-Exchange Encryption is the cryptographic conducting tool to assurance data owners enduring control above their data in public cloud storage. The earlier ABE plans include one and only power (Authority) to keep up the entire trait (Key) set, which can carry a solitary (single) point bottleneck on both safety and execution. In this way, some multi- power (Multi-Authority) plans are proposed, in which various powers independently keep up disjoint attribute subsets. In any case, the single-point bottleneck issue stays unsolved. In this paper, from another point of view, we conduct a threshold multi-authority CP- ABE access control plan for open distributed storage, named TMACS, in which various powers together deal with a uniform characteristic set. In [9] TMACS, taking advantage of (t; n) limit mystery sharing, the expert (Master) key can be shared among numerous powers, and a legitimate client can produce his/her mystery (Private) key by cooperating with any t powers. Security and execution investigation results demonstrate that system is not just undeniable secure when not as much as t powers are traded off, additionally dynamic when no not as a great deal as t powers are alive in the framework. Besides, by proficiently joining the customary multi-power plan with system, we build hybrid one, which fulfils the attributes originating from various authorities and accomplishing security.
Other Latest Articles
- Mechanical Engineering in Ancient Egypt, Part 43: Statues of Horse, Leopard, Turtle and Frog
- An Accurate Classifier for Detecting the Ecosystem of Malicious Application on Online Social Network using MADE
- Smart ATM center with bring along mechanism for card and cash retrieval after transaction
- Automated Decision Support System for Pathology of Diabetic Retinopathy from OCT
- Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization
Last modified: 2017-12-12 12:06:44