|
Details
ABSTRACTNowadays, many people easily sharing data through network and computing technology using online external storages. The key generation center (KGC) can decrypt all cipher text addressed to specific users by generating their attribute keys. This can be a potential threat to the data privacy in the data sharing system. To overcome this problem, we improve the security in data sharing by attribute-based encryption (ABE) which is a cryptographic approach that achieves fine-grained data access control. Then, cipher text-policy attribute-based encryption (CP-ABE) scheme can encrypt the attribute and secure data sharing system. The advantage of (CP-ABE) is a major drawback which is known as a key escrow problem that can be solved by escrow-free key issuing protocol. The key issuing protocol can generate user secret key by use a secure two-party computation (2PC) protocol between the KGC and data storing center with their own master secrets. In conclusion, we can more secure and fine-grained data access control in the data sharing system by using (CP-ABE) scheme. The data confidentiality can be cryptographically applied against any KGC or data storing center in the scheme.
. INTRODUCTIONThe data sharing model in distributed system such as online network have been increasing request for distributed data security. The problems that have been arising are the data by the storage server by outside users could be possible dangers to their data with using the key generation center (KGC). The KGC is defined the process of generating keys in cryptography. Furthermore, KGC can decrypt all messages or data with using their private keys. Thus, KGC is not suitable for data sharing because the owner want to make their private data that only can available to designated users key. By using technique Cipher text Policy Attribute-Based Encryption (CP-ABE), the encrypted data can be kept private even if the storage server is untrusted but our techniques are secure against conspiracy attacks. The CP-ABE is enabling to encrypt the attribute set over a universe of attributes that a decrypt to possess in order to decrypt the cipher text and apply it.
OBJECTIVESMETHODOLOGY
RESULTCONCLUSION In a nutshell, data are more secure when using Cipher text Policy - Attribute Based Encryption. Therefore, Cipher text Policy - Attribute Based Encryption is a one of the Advanced Cryptography . In C P-ABE, a data is encrypted based on the access structure such that only those whose attributes satisfy this structure and can decrypt the data. Unauthorized users are not able to decrypt the cipher text even if they collude.
COMMENT |