z-logo
open-access-imgOpen Access
A multi Ability CP-ABE access control scheme for public cloud storage
Author(s) -
Kothapalli Chaitanya Deepthi,
Dasari Ashok,
M. Krishna
Publication year - 2019
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1228/1/012018
Subject(s) - multicast , computer science , key encapsulation , encryption , session key , computer security , session (web analytics) , communication source , key (lock) , computer network , public key cryptography , symmetric key algorithm , world wide web
The main personality of the cryptography structure based on communication with writings of stable figures and private keys [1-4]. Our development is a key encapsulation mechanism (KEM), so long messages can be coded under a short symmetric key. In our response, the writings of the figures and the private keys have stable dimensions and the people in general are directly in the maximum estimate of s. Furthermore, in our plan, the private key generator (PKG) can potentially include new people without modifying the already widespread data (as in the EIB’s plans). We also note that there is no chain of importance between the characters, despite HIBE. The income of the general population is directed at the maximum size of S, and not in the amount of decoding keys that can be transmitted, which is the amount of conceivable characters. In this case, use a simple situation to find out about the group classification and main administration test problems. Think about a source that sends information to a provision of beneficiaries in a multicast session. Session security is supervised by two principles of useful substances: a Group Controller (GC) responsible for confirmation, approval and control and a Key Server (KS). To ensure classification in the middle of the multicast session, the sender (source) shares a mysterious symmetric key with all the individuals in the legitimate collection, called the Traffic Encryption Key (TEK). To multicast a mysterious message, the source encodes the message with the TEK using a symmetric encryption calculation. From previous documents, we look at how to share protected information in the cloud without losing keys. In this article, we present a new digital brand, an SSH key, hash functionality, and major escrow calculations.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here