ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Review on Secure System Implementation using Attribute Based Encryption?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 11)

Publication Date:

Authors : ; ;

Page : 465-468

Keywords : Attribute based encryption; cipher text policy; Revocation;

Source : Downloadexternal Find it from : Google Scholarexternal


In Data sharing such as social network or cloud computing there is an demand for data security. Challenging issue in data sharing system is access policy and support of policy update. The policy attribute based encryption (CP-ABE) is cryptographic solution to this issue. The data owner defines their own access policy over user attribute and applies this policy on data. These scheme introduce the problem is called as key escrow problem, in which key generation center decrypt any message which addressed to the User by generating there private key. Data accessible to only authorized user. Also it introduces another challenge regard to user revocation. In this research work the proposed novel CP-ABE scheme is used to solve the key escrow problem by escrow free key issuing protocol generated by using two party computations. Fine-grained user revocation per each attribute could be done by proxy encryption.

Last modified: 2014-11-25 21:10:35