z-logo
open-access-imgOpen Access
Elliptic Curve based Collaborative Group Key Management for Cloud Data Sharing in Ciphertext Policy Attribute based Encryption
Publication year - 2019
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.f1098.0886s19
Subject(s) - computer science , encryption , attribute based encryption , computer security , cloud computing , group key , public key cryptography , operating system
Ciphertext policy attribute based encryption (CPABE) is one of cryptographic procedure that coordinates data information encryption with authenticated admission management for guaranteeing data information security in Cloud. The cloud computing where the application administrations using the Internet. In numerous applications, especially in Group Communication in cloud data information offering to various clients data information proprietors require to conceal undisclosed data information like encryption key. The effective key management system conventions are essential for giving security to this data information. Since, it is extremely difficult to provide security to group's secret data information particularly with various mechanisms of assurance. The effectiveness issue of CP-ABE is as yet accessible that corrupt the computation overhead on the grounds that bilinear pairing is exorbitant in such huge numbers of utilizations of ABE, so by supplanting the bilinear pairing utilized in the attribute coordinating with straightforward scalar multiplication on Elliptic Curves, accordingly diminishing the general computation just as communication overhead. And plan another key dispersion can considered in order to legitimately renounce a client or a characteristic without refreshing the other clients' keys during the property repudiation phase. By utilizing the Shamir's Threshold secret sharing designs access structure to develop the expressiveness of the entrance arrangement. Security and execution examination demonstrate that in this plan improving the general effectiveness just as guarantee the security of the cloud data information

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here