ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.5, No. 11)

Publication Date:

Authors : ; ;

Page : 83-91

Keywords : Key - Policy; Cipher Text - Policy; Non Monotonic Framework; ABE and encryp tion; Location Based Encryption.;

Source : Downloadexternal Find it from : Google Scholarexternal


In the era where computers dominate the other facilities, it becomes even more productive once connected to the world with the help of internet. Although it possesses certain challenges to connect oneself to the world. The challenges of Authenticity, confidentiality, and anonymity and all of the notions of security with the concern a spects. Depending on the application the encryption techniques differs the most recent assortment that is the attribute based encryption, unlike traditional encryption technique this technique doesn't reveals its identity Security tends to be the most impo rtant aspect when it comes to enter in the visual world thus the cryptographic technique is very much essential to be optimally developed so the transactions made cannot be read or changed in the network that is the data have to be securely traverse via in ternet, Attribute based cryptography techniques are dominating the aspects of security. The innovative use of attributes can improve the traditional techniques of data sharing which was by using trusted mediated servers. These attributes have been exploite d to generate the public key and have been used as user's access policy to restrict the user's access. It is attribute - based, as it allows encrypting under logical combinations of attributes, that is, properties that users satisfy. It is hybrid, as it comb ines ciphertext policy attribute - based encryption (CP - ABE) with location - based encryption (LBE) on the level of symmetric keys. It supports encryption under expressive policies, since it can efficiently handle dynamic attributes with continuous values, suc h as location. Public key encryption techniques provide authenticity through digital signature and confidentiality with the help of public key encryption technique. Security also overcomes the bottleneck of centralization since there is no central authorit y, it works as distributed attribute based encryption where the load is well distributed among every participating node.

Last modified: 2016-11-07 18:00:14