• No results found

CP-Attribute based encryption

Novel ECC Data Security & Privacy Preserving by using TCP-ABE Algorithm

Novel ECC Data Security & Privacy Preserving by using TCP-ABE Algorithm

... utilizing CP-Attribute based encryption for decentralized DTNs where multiple key ascendant entities manage their attributes ...Text-Policy Attribute Predicated Encryption for ...

7

Review Paper on Data Access Control using CP ABE for Multi Authority Cloud Storage System

Review Paper on Data Access Control using CP ABE for Multi Authority Cloud Storage System

... Cipher-text-Policy Attribute-Based Encryption (CP-ABE) is the most excellent technique to provide efficient and secure data access control for public cloud ...Existing CP-ABE schemes ...

6

Fine-Grained Access Control on Time-Sensitive Data Using Timed-Release Encryption with Ciphertext Attribute Based Encryption in Public Cloud

Fine-Grained Access Control on Time-Sensitive Data Using Timed-Release Encryption with Ciphertext Attribute Based Encryption in Public Cloud

... utilizing attribute based encryption (ABE) have been proposed to get control of outsourced information in distributed computing; A large portion of them experience the effects of rigidity in ...

6

An Attribute Based Encryption Scheme to Secure Fog Communications

An Attribute Based Encryption Scheme to Secure Fog Communications

... An Attribute-Based Encryption Scheme to Secure Fog Communications to achieve confidentiality, authentication, very ability, and access control, we combine CP-ABE and digital signature ...

7

A Hierarchical Distributed Authority based Model for Security and Integrity in Cloud Computing

A Hierarchical Distributed Authority based Model for Security and Integrity in Cloud Computing

... single attribute ―Post can be assigned to multiple ...recursive attribute set is assigned to a user in the ASBE scheme, attributes from the same set can be easily combined, while attributes from different ...

7

An Efficient and Robust Embedded Digital Signature Based Data Sharing Scheme in Cloud Computing

An Efficient and Robust Embedded Digital Signature Based Data Sharing Scheme in Cloud Computing

... promising encryption techniques for secure data sharing in the field of Cloud Computing is Cipher text-Policy Attribute-Based Encryption ...(CP-ABE).This encryption technique has ...

7

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

... ciphertext-policy attribute-based encryption (CP-ABE), depends how attributes and policy are associated with cipher texts and users’ decryption ...a CP-ABE scheme, a ciphertext is ...

6

Decentralized Interruption-Tolerant using Secure Data Rescue for Armed Force Networks

Decentralized Interruption-Tolerant using Secure Data Rescue for Armed Force Networks

... text-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control ...using CP-ABE for decentralized DTNs where multiple key authorities manage ...

5

CCP-ABE Technique For Decentralized Disruption Tolerant Military Networks

CCP-ABE Technique For Decentralized Disruption Tolerant Military Networks

... specific Attribute based encryption ...the CP-ABE scheme in terms of computational and communication overhead under comparable security levels while providing message and Identity ...

9

A  Hybrid Encryption Algorithm with Diffie-Hellman assumption In Cloud Computing

A Hybrid Encryption Algorithm with Diffie-Hellman assumption In Cloud Computing

... -policy attribute-based encoding (CP -ABE)[1] and verifiable delegation (VD) area unit accustomed make sure the information confidentiality and also the verifiability of delegation on dishonest cloud ...

10

PROFICIENT AND FINE-GRAINED HUGE DATA ACCESS MANAGE SYSTEM WITH PRIVACY- PRESERVING POLICY
                 

PROFICIENT AND FINE-GRAINED HUGE DATA ACCESS MANAGE SYSTEM WITH PRIVACY- PRESERVING POLICY  

... aware attribute-based encryption with user accountability (12) a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing ...

5

Reliable Sharing Of Personal Health Records In Cloud Using Attribute Based Encryption

Reliable Sharing Of Personal Health Records In Cloud Using Attribute Based Encryption

... used, where each authority governs a disjoint set of attributes distributive. It is natural to associate the cipher text of a PHR document with an owner- specified access policy for users from PUD. However, one technical ...

5

Title: Achieving Access Control and Data Confidential by Attribute-Based-Hybrid Encryption in Cloud Computing

Title: Achieving Access Control and Data Confidential by Attribute-Based-Hybrid Encryption in Cloud Computing

... Delegation computing is the main service provided by the cloud servers. The healthcare organizations store data files in the cloud by using CP-ABE under some access policies. The users, who want to access the data ...

6

A Novel Key-Policy Attribute-Based Encryption Schema with Verifiable Computation in Cloud

A Novel Key-Policy Attribute-Based Encryption Schema with Verifiable Computation in Cloud

... a CP-ABE system, each cipher text is associated with an access structure, and each private key is labeled with a set of descriptive ...ciphertext-policy attribute-based hybrid encryption with ...

5

Updating  attribute  in  CP-ABE:  A  New  Approach

Updating attribute in CP-ABE: A New Approach

... Ciphertext-Policy Attribute Based Encryption (CP-ABE), attributes are attached to the user‟s secret key and access policy is at- tached to the ...particular attribute effi- ciently ...

19

A Novel Key-Policy Attribute-Based Encryption Schema with Verifiable Computation in Cloud

A Novel Key-Policy Attribute-Based Encryption Schema with Verifiable Computation in Cloud

... access. Encryption helps to protect user data confidentiality, it makes difficult to perform secure plain text search over the encrypted data Attribute-Based Encryption (ABE) is a promising ...

5

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

... Ciphertext-policy attribute-based encryption is a reliable cryptographic solution to access control ...Policy attribute based encryption for decentralized DTNs is providing many ...

6

Analysis on Attribute Based Encryption for Secure Data Retrieval in DTNS

Analysis on Attribute Based Encryption for Secure Data Retrieval in DTNS

... data encryption in network security and various encryption algorithms used in cryptography to improve the data ...In attribute based encryption gives more challenging solution to ...

7

Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing

Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing

... advanced encryption techniques such as Attribute Based Encryption (ABE) is inefficient to resolve this issue due to its expensive computation ...Policy Attribute Based ...

22

Cloud based Hierarchical Multi User Data Shared Attribute based Encryption

Cloud based Hierarchical Multi User Data Shared Attribute based Encryption

... standard encryption (including symmetric key and public-key) techniques for EHR encryption/decryption caused increased access control and performance overhead, the scheme proposes the use of ...

12

Show all 10000 documents...

Related subjects