UNDERSTANDING THE DIFFERENT VULNERABILITY METHODS OF ATTACKS IN SECURE DATA
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 8)Publication Date: 2015-08-30
Authors : S.Padmaja; Mrs.J.Uma Maheswari;
Page : 888-890
Keywords : Network; Vulnerable attacks; CP;
Abstract
Cipher text - policy attribute based encryption (CPABE) provides an encrypted access control mechanism for broadcasting messages. Basically, a sender encrypts a message with an access control policy tree which is logically composed of attributes; receivers are able to decrypt the message when their attributes satisfy the p olicy tree. A user’s attributes stand for the properties that he current has. It is required for a user to keep his attributes up - to - date. However, this is not easy in CP - ABE because whenever one attribute changes, the entire private key, which is based on all the attributes, must be changed. In this paper, we introduce fading function, which renders attributes ”dynamic” and allows us to update each one of them separately. We study how choosing fading rate for fading function affects the efficiency and secu rity. We also compare our design with CP - ABE and find our scheme performs significantly better under certain circumstance
Other Latest Articles
- FUZZY ? BASED ACCOMODATION ALLOCATION SYSTEM
- EFFECTIVELY REMOVING HALO - ACETIC ACIDS FROM WATER BY BIO - ACTIVATED CARBON METHOD
- A NEW EFFICIENT MPPT FOR WECS IN TROPICAL COUNTRIES
- PERFORMANCE ANALYSIS OF INTEGRATED WIFI/WIMAX MESH NETWORK WITH DIFFERENT MODULATION SCHEMES
- DESIGN OPTIMIZATION OF A KEVLAR 29 SINGLE DISK FRICTION CLUTCH PLATE BASED ON STATIC ANALYSIS USING ANSYS
Last modified: 2015-08-27 17:21:49