Research Paper 1
Research Paper 1
Research Paper 1
Abstract-Ciphertext policy attribute based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access
control of outsourced data in the cloud. One drawback in urgent need of solution is the key escrow problem. In this work, we
propose a collaborative key management protocol in CP-ABE (CKM-CP-ABE). Our construction realizes distributed generation,
issue and storage of private keys .A fine-grained and immediate attribute revocation is provided for key update. The proposed
collaborative mechanism effectively solves not only key escrow problem but also key exposure. Meanwhile, it helps markedly
reduce client decryption overhead. A comparison with other representative CP-ABE schemes demonstrates that our scheme has
some what better performance in terms of cloud-based outsourced data sharing on mobile devices.
2
to decrypt the data, it is not possible because the users can only
have a part of attribute set and it cannot match the attribute set
criteria. Even if multiple users combine their attribute set, it will
not match the criteria of the access structure policy.
3. User/attribute revocation:When an user leaves the system the
policy revokes the access of the user to thesystem.
4. Scalability:The scheme doesn’t not have adverse effects when
more users enter the policy. It has the functionality to maintain the
same performance throughout system for allusers. Even if the users
authorised are increased dynamically the system will provide
goodperformance.
VI.Conclusion
Proposed system, we reformed an attribute-based data sharing
scheme in cloud computing. The key escrow problem was resolved
by enhanced key issuing protocol . It enhances data confidentiality
and privacy in cloud system against the managers of Key
Distribution Center (KDC) and Cloud Server Providers as well as
malicious system outsiders, where Key Distribution Center (KDC)
and Cloud Server Providers are semi-trusted. In addition, the
weighted attribute was proposed to improve the expression of
attribute, which can not only describe arbitrary state attributes, but
also reduce the complexity of access policy, so that the storage cost
of ciphertext and time cost in encryption can be saved.
Conclusively, in the proposed system it has been proved that
performance and security analyses, in which the results express
highest efficiency and security of our scheme.
References
[1] [SW05] Sahai, A., Waters, B.: Fuzzy identity-based
encryption. EUROCRYPT 2005.
[2] [GPSW06] Goyal, V., Pandey, O., Sahai, A., Waters, B.:
Attribute-based encryption for finegrained access control of
encrypted data. ACM CCS2006.
[3] [BSW07] Bethencourt, J., Sahai, A., Waters, B.:
Ciphertext- policy attribute-based encryption. IEEE Symposium
on Security and Privacy,2007
[4] [CN07] Cheung, L., Newport, C.C.: Provably secure
ciphertext policy abe. ACM CCS2007
[5] [GJPS08]Goyal,V.,Jain,A.,Pandey,O.,Sahai,A.:
Bounded Ciphertext Policy Attribute Based Encryption.
ICALP 2008, PartII.
[6] [Waters08/11] Waters, B.: Ciphertext-policy
attribute-based encryption: An expressive, efficient, and
provably secure realization. PKC2011
[7] [LOSTW10] Lewko,A.B.,Okamoto, T., Sahai,A.,
Takashima,K.,Water B.: Fully secure functional encryption:
Attribute- based encryption and (Hierarchical) inner product
encryption. EUROCRYPT2010.
[8] [OT10] Okamoto, T., Takashima, K. : Fully secure
functional encryption with general relations from the decisional
linear assumption. CRYPTO2010.
[9] [MKE09] Muller, S., Katzenbeisser, S., Eckert, C.:
Onmulti- authority ciphetext-policy attribute-based
encryption. Bulletin of theKoreanMathematicalSociety2009.
[10] [LW11] Lewko, A., Waters, B.: Decentralizing
attribute- based encryption. EUROCRYPT2011.
3
4