
Re-Distributed Multi-Authority Attribute Based Encryption in Cloud Using CP-ABE Algorithm
Author(s) -
T. Siddhardha,
Murugaanandam,
D. Sri Nithin,
V. Raghuveer
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/994/1/012008
Subject(s) - computer science , encryption , collusion , computer security , cloud computing , attribute based encryption , identity (music) , identifier , domain (mathematical analysis) , public key cryptography , data sharing , computer network , mathematics , business , medicine , mathematical analysis , physics , alternative medicine , pathology , industrial organization , acoustics , operating system
Cloud Computing allows us to store and share the data easily with others. Redistributed “multi-authority Attribute-Based Encryption (ABE)” has importantly implemented for finding the solutions to the problem that which arises from sharing private corporate information in computing of cloud. For Re-distributed multi-authority ABE in cloud devices that don’t believe in a single main authority, collusion resistance are often done employing a universal identifier. so for that reason, identity must be globally managed, that ends up within the critical issues of privacy and protection. The new scheme is implemented that doesn’t use a single main authority in order to co “ordinate users and keys, and only normal trust relations got to be done with sharing the general public key in between each attribute authority” (AA). The “identities of the user are different and different by combination of the user’s identity along the identity of the AA where the user is found”. If a key request must be made to the authority outside of the domain, the request must be done by the authority within the present domain instead of by the client’s, so, the user identities should remain secured to the AA outside the domain that can strengthen privacy and protection. Along with that, the main issuing protocol in between Attribute Authority is straight forward because of the results of trusted AA relationship. On top of that, the authority’s extensibility is also supported by the method presented in our paper. The scheme is predicated on order of Composite in which the groups are bilinear. Validation of protection is given which uses the twin system methodology of encryption.