A Secure and Efficient Erasure Code-based Content Transmission in Cloud Using Cp-abe Approach

نویسندگان

  • G. Anitha
  • Mr. S. Arunkumar
چکیده

-In cloud the retention of retrieval data transmission which contain collection of storage servers to enable expanded storage services .Transmission of content in cloud causes data robustness and data confidentiality .For data robustness implementation of erasure code-based content with multiple key servers are concerned for the recovery process using redundancy. For data confidentiality implementation of homomorphic integrity based on new integrity tags can be computed from old integrity tags by storage servers without involvement of the user's secret key or backup servers CPABE(Cipher policy –Attribute based encryption approach where followed to prove the security of our integrity check scheme formally, and establish the parameters for achieving for data retrival. A system for realizing complex access control on encrypted data that we call Ciphertext-Policy Attribute-Based Encryption. By using our techniques encrypted data can be kept confidential even if the storage server is untrusted moreover, our methods are secure against collusion attacks. Previous Attribute Based Encryption systems used attributes to describe the encrypted data and built policies into user’s keys, while in our system attributes are used to describe a user’s credentials, and a party encrypting data determines a policy for who can decrypt.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

A Lterature Survey on Revocable Multiauthority Cipher Text-policy Attribute-based Encryption (cp-abe) Scheme for Cloud Storage

In a Cloud Computing the data security achieved by Data Access Control Scheme. Cipher text-Policy Attribute-based Encryption (CP-ABE) is considered as one of the most suitable scheme for data access control in cloud storage. This scheme provides data owners more direct control on access policies. However, CP-ABE schemes to data access control for cloud storage systems are difficult because of t...

متن کامل

User Revocation Based Anonymous Access Provision for Efficient Cloud User Privacy

Cloud computing is a recent technology provides a flexible, on-demand and low cost feature of computing resources. The Main issue in Cloud Computing is user identity privacy and data content privacy. The User Privacy in Cloud Computing is achieved by various data access control Schemes. Existing Fully Anonymous Access control scheme with decentralized attribute authority provides data content p...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016