ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 5)

Publication Date:

Authors : ; ;

Page : 2627-2631

Keywords : Data integrity; Data sharing; attribute-based encryption; removing escrow; privacy protection;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In this paper, our main issue is an authorization and providing the data security for various applications in web services in a network. Cloud Computing is a revolutionary IT field and we are using this technology for various purposes. With the increasing use of the data sharing in distributed systems such as online social networks or cloud computing, there is increasing in concerns for data security while distributing or sharing data. Here, Ciphertext policy attribute-based Encryption (CP-ABE) is becoming cryptographic solution to above issue of secured data sharing among network. Also, we will have these achievements1) key escrow problem could be solved by escrow-free key issuing protocol, where key is generated using the secure two-party computation between the key generation center and the data-storing center 2) fine-grained user revocation per each attribute could be done by using anonymous id algorithm where sharing of data will be done on attribute basis.

Last modified: 2021-06-30 21:46:31