ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

UNDERSTANDING THE DIFFERENT VULNERABILITY METHODS OF ATTACKS IN SECURE DATA

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 8)

Publication Date:

Authors : ; ;

Page : 888-890

Keywords : Network; Vulnerable attacks; CP;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cipher text - policy attribute based encryption (CPABE) provides an encrypted access control mechanism for broadcasting messages. Basically, a sender encrypts a message with an access control policy tree which is logically composed of attributes; receivers are able to decrypt the message when their attributes satisfy the p olicy tree. A user’s attributes stand for the properties that he current has. It is required for a user to keep his attributes up - to - date. However, this is not easy in CP - ABE because whenever one attribute changes, the entire private key, which is based on all the attributes, must be changed. In this paper, we introduce fading function, which renders attributes ”dynamic” and allows us to update each one of them separately. We study how choosing fading rate for fading function affects the efficiency and secu rity. We also compare our design with CP - ABE and find our scheme performs significantly better under certain circumstance

Last modified: 2015-08-27 17:21:49