ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Identifying the Performance Efficiency Of Attribute Based Encryption With Secured Resource in Cloud

Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 10)

Publication Date:

Authors : ; ; ; ; ;

Page : 278-281

Keywords : Attribute-based encryption; access control; outsourcing computation; key issuing; check ability;

Source : Downloadexternal Find it from : Google Scholarexternal


Attribute-based encryption (ABE) can be used for the encryption of data with attributes and logs. Instead of encrypting each part of a log with the keys of all recipients, it is possible to encrypt the log only with attributes which match recipient�s attributes. This primitive can also be used for broadcast encryption in order to decrease the number of keys used. Here the access control will be given with the keys and the attributes. The outsourcing computation cost will be comparatively less when compared to the existing system. The data will be shared between the two users if and only if the key matches. In addition, for the first time, we propose an outsourced ABE construction which provides check ability of the outsourced computation results in an efficient way. The performance analysis has been proven this method to be more secured.

Last modified: 2016-01-07 16:39:31