Open Access
AN Effective PHR Based Secure Data Distribution using KC-ABE in Cloud Environment
Author(s) -
M. Sangeetha,
P. Vijaya Karthik,
SUHAIB AKTHAR.A
Publication year - 2019
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.a2260.109119
Subject(s) - encryption , attribute based encryption , computer science , data sharing , cloud computing , computer security , key (lock) , information sharing , access control , secret sharing , cryptography , on the fly encryption , public key cryptography , world wide web , operating system , medicine , alternative medicine , pathology
The objective of the research work is focused on cloud computing which is a developing design to give secure change among continuous applications. Secure information sharing is characterized as transmission of at least one documents profitably this procedure is utilized to share data’s, characteristics, records among different clients and associations in secure mode and verifies from outsider clients. Usually it is finished by encryption and unscrambling process over private system. This kind of information sharing is finished by new innovation of key cipher text KC-ABE. It can give secure record transmission by having confined access innovation. This developing procedure has been checked in tolerant individual wellbeing record upkeep. These documents are recorded and recovered safely without access by unapproved clients. KC-ABE encryption framework is material to produce for adaptable and secure sharing of information’s in distributed computing, which will reinforcement persistent wellbeing creating records in increasingly defensive manner. In KC-ABE strategy, the subtleties of patient are put away in KC-ABE server farm. In KC-ABE, Key backer just legitimize the entrance control and can’t issue by the encryption. Along these lines the relating tolerant just reserve the options to get to this KC-ABE innovation. It gives more secure information sharing than other encryption framework. The fundamental utilization of this technique are High key age time and encryption time. It can accomplish less encryption time and key age time to improve productivity of KC-ABE.