Key Policy Attribute Based Encryption in Cloud Storage

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5

Abstract

Abstract: Cloud Computing is the rapid growing technology and enables highly scalable services to be easily consumed over the Internet on an as-needed basis. It is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices. Cloud computing has become a highlydemanded service or utility due to the advantages of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Some cloud vendors are experiencing growth rates of 50% per year but being still in a stage of infancy, it has pitfalls that need to be addressed to make cloudcomputing services more reliable and user friendly. Data sharing is an important functionality in cloud storage. The proposed system provides how to maintain integrity, confidentiality and availability to share data with others. Here described new Attribute Based Encryption cryptosystems which generates encryption, decryptiontime along with file size. Proposed work explains encryption with Attribute Based encryption then file is spitted into chunks. Hash key is generated for every data chunk which is unique. Secure hash algorithm is used for generation of hash key. For decryption file is searched on cloud, with private key then it is decrypted. Attribute Based encryption along with secure hash algorithm is applied. This proposed work describes analysis of encryption, decryption time calculated with Identity Based encryption and Attribute Based encryption according to file size. It creates hash key for every chunk which is unique. Proposed algorithm gives confidentiality towork as it is a public key encryption algorithm of cryptography. It is also asymmetric i.e. key set is used for data encryption and decryption. Data is stored on cloud means it is available to everyone through Cloud space. Key generated for encryption and decryption is runtime. In this work analysis is there. Encryption and decryptiontime required by Identity Based Encryption and Attribute Based Encryption is calculated for comparison purpose. Both algorithms user can apply on different file type such as pdf, ppt, doc, mp3, jpg and file size.

Authors and Affiliations

Prof. Dipa Dharmadhikari , Sonali Deshpande

Keywords

Related Articles

 Enhanced Security Algorithm using Hybrid Encryption and ECC

Abstract: The AES and ECC are the best two algorithms of symmetric encryption technology and asymmetric encryption technology. The paper presents a hybrid model which uses a combination of two symmetric algorithms enhanc...

 Mobile Phone Embedded With Medical and Security Applications

 Abstract: This paper introduces MOBILE PHONE EMBEDDED WITH ANDROID BASED EMERGENCY ALERT BUTTON AND MEDICAL TOOLS - a mobile phone can serve us with various functions of security applications and medical tools. T...

Optimal Planning of the Production of Corpus Details on Metal Cutting Machines with the Help of Computer Numeric Control

Abstract: The optimal planning of details mechanical processing is a key problem, directly affecting the productivity and efficiency of the activity of a machine building company. The combinatorial character of the prob...

“Development of Biometrics technology in multimode fusion data in various levels”

In this paper study of the biometrics. The recognition of face and fingerprint. The authentication of face and fingerprint are using various fusion levels. In this technology are useful for various applications. The biom...

 A Challenge to Analyze and Detect Altered Human Fingerprints

 The deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has escalated the need for ensuring that these systems are not compromised. Several proble...

Download PDF file
  • EP ID EP96326
  • DOI -
  • Views 129
  • Downloads 0

How To Cite

Prof. Dipa Dharmadhikari, Sonali Deshpande (2016). Key Policy Attribute Based Encryption in Cloud Storage. IOSR Journals (IOSR Journal of Computer Engineering), 18(5), 64-71. https://www.europub.co.uk/articles/-A-96326