A New Algorithm to Generate The Integrated Access Trees For A Document Collection

Ravuri Aruna Jyothi, Tadi Sai Durga

Abstract


ABE schemes have been broadly in use to firmly store and allocate data in cloud computing. A procedure method which congregates the requirements of different data users is considered and used to encrypt distributed file systems. Cloud computing accumulates and categorizes a huge amount of data method possessions to endow with secure, efficient, flexible and on demand services. In ABE schemes, every document is encrypted independently and a data user can decrypt a document if the attribute set equivalents the access formation of the document. In this we confine our consideration to the document collection encryption-decryption process and pay no attention to the other technical challenges such as symmetric encryption algorithms and encrypted document search algorithms. The protection of CP-ABHE is hypothetically established and the efficiency of the integrated access tree construction algorithm is scrutinized in facet. The intact document outsourcing and sharing system contains abundant delve into lines.

References


J. Bethencourt, A. Sahai, and B.Waters, ``Ciphertext-policy attribute-based encryption,'' in Proc. IEEE Symp. Secur. Privacy, May 2007, pp. 321_334.

D. Boneh and B. Waters, ``Conjunctive, subset, and range queries on encrypted data,'' in Proc. TCC, 2007, pp. 535_554.

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, ``Privacy-preserving multi-keyword ranked search over encrypted cloud data,'' IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222_233, Jan. 2014.

A. D. Caro and V. Iovino, ``jPBC: Java pairing based cryptography,'' in Proc. IEEE Symp. Comput. Commun. IEEE Comput. Soc., Jun. 2011, pp. 850_855.

C. Chen et al., ``An ef_cient privacy-preserving ranked keyword search method,'' IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 951_963, Apr. 2016.

R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, ``Searchable symmet-ric encryption: Improved de_nitions and ef_cient constructions,'' in Proc. ACM CCS, 2006, pp. 79_88.

H. Deng et al., ``Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts,'' Inf. Sci., vol. 275, pp. 370_384, Aug. 2014.

Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, ``Enabling personalized search over encrypted outsourced data with ef_ciency improvement,'' IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 9, pp. 2546_2559, Sep. 2016.

P. Golle, J. Staddon, and B. Waters, ``Secure conjunctive keyword search over encrypted data,'' in Proc. ACNS, 2004, pp. 31_45.

V. Goyal, A. Jain, O. Pandey, and A. Sahai, ``Bounded ciphertext policy attribute based encryption,'' in Automata, Languages and Programming. Berlin, Germany: Springer, 2008, pp. 579_591.

V. Goyal, O. Pandey, A. Sahai, and B.Waters, ``Attribute-based encryption for _ne-grained access control of encrypted data,'' in Proc. 13th ACMConf. Comput. Commun. Secur., 2006, pp. 89_98.

J. Han, W. Susilo, Y. Mu, and J. Yan, ``Privacy-preserving decentralized key-policy attribute-based encryption,'' IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 11, pp. 2150_2162, Nov. 2012.

J. Lai, R. H. Deng, C. Guan, and J.Weng, ``Attribute-based encryption with veri_able outsourced decryption,'' IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343_1354, Aug. 2013.

A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B.Waters, ``Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,'' in Proc. EUROCRYPT, 2010, pp. 62_91.

A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, ``Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,'' in Proc. Int. Conf. Theory Appl. Cryptograph. Techn. Berlin, Germany: Springer-Verlag, 2010, pp. 62_91.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.