0% found this document useful (0 votes)
46 views4 pages

1.search Based On Efficient Verifiable Public Key Encryption With Keyword KP-ABE

This document discusses 7 papers related to attribute-based encryption schemes for secure data sharing in cloud computing. The papers propose improvements to existing attribute-based encryption methods like CP-ABE to address limitations and enable new capabilities such as keyword search, hierarchical key distribution, efficient revocation, and expression of complex access policies. Decentralized and collaborative approaches are introduced to improve scalability, security and performance for multi-user cloud environments.

Uploaded by

darshan chaganti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views4 pages

1.search Based On Efficient Verifiable Public Key Encryption With Keyword KP-ABE

This document discusses 7 papers related to attribute-based encryption schemes for secure data sharing in cloud computing. The papers propose improvements to existing attribute-based encryption methods like CP-ABE to address limitations and enable new capabilities such as keyword search, hierarchical key distribution, efficient revocation, and expression of complex access policies. Decentralized and collaborative approaches are introduced to improve scalability, security and performance for multi-user cloud environments.

Uploaded by

darshan chaganti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1.

Search Based on Efficient Verifiable Public Key


Encryption with Keyword KP-ABE
Description: in this paper we can search encrypted data using
keyword search
Existing system: peks(public key encryptionkeyword search)
scheme is used.
Proposed system: they took verifiable attribute-based keyword
search (VABKS) as a base for this they improvised it into key
policy attribute-based keyword search(KP-ABKS) in this public
key and private key for the cloud server and data owner
through the RSA algorithm to prevent the out adversary to
execute the search operation, which enhances the security of
scheme.

2.Hierarchical Authority Key-Policy Attribute-


Based Encryption
Existing system: key-policy attribute-based encryption (KP-ABE)
Proposed system: hierarchical authority key-policy attribute-
based — encryption (HA-KP-ABE) by using this we can
distribute private keys to users so that we cannot depend upon
the central authority by this we can achieve security and
Access tree is used in the phase of key generation and different
users’ attribute sets are allowed to overlap, achieving fine-
grained access control.
Algorithm: decisional MBDH is used to prove security
3.A SEARCHABLE ENCRYPTION OF CP-ABE
SCHEME IN CLOUD STORAGE
Existing system: CP-ABE algorithm with homomorphic
encryption
Proposed system: in this paper they constructed Searchable
Encryption CP-ABE (SE-CP-ABE) by using homomorphic
encryption scheme by this they achieve users can retrieve the
needed data from file which store in cloud, and do not need to
download the cipher-text.

4.An Extended CP-ABE based Access Control


Model for Data Outsourced in the Cloud
Existing system: CP-ABE algorithm
Proposed system: Collaborative Ciphertext-Policy Attribute Role
Based Encryption (C-CP-ARBE).
In this every user gave a role with attributes this method is
mainly used in multi authority and multi user segments by
using this one can achieve scalable user Management and less
user revocation with less cost and time and they compared this
scheme with cp-abe and produce test results. This is mainly
used when users are high as there roles and attributes are
increased.
5.A CP-ABE SCHEME WITH SYSTEM ATTRIBUTES
REVOCATION IN CLOUD STORAGE
Existing system: attribute revocation become a problem by
using existing schemes using cp-abe. Data Owners (DO) change
their access strategies, they still need to redo the entire
plaintext encryption process
Proposed system: for this problem they use re-encryption key
of minimum shared attribute set, which achieves a simple
privilege revocation control, improve the efficiency and
practicality of the entire scenario.
For this they use AB-MSREAS scheme is based on AB-ACER.

6.Attribute-Based Data Sharing Scheme


Revisited in Cloud Computing
Existing system: CP-ABE is limited to a potential security risk
that is known as key escrow problem, most of the existing CP-
ABE schemes cannot support attribute with arbitrary state.
Proposed system: propose an improved two-party key issuing
protocol that can guarantee that neither key authority nor
cloud service provider can compromise the whole secret key of
a user individually.
weighted attribute was proposed to improve the expression of
attribute, which can not only describe arbitrary- State
attributes, but also reduce the complexity of access policy, so
that the storage cost of ciphertext and time cost in encryp- tion
can be saved.
7.Decentralized Attribute-Based Encryption
Scheme with Scalable Revocation for Sharing
Data in Public Cloud Servers
Existing system: CP-ABE SCHEME
PROPOSED SYSTEM: decentralized ciphertext-policy ABE
scheme (CP-DABE) for a large-scale cooperative cloud
environment. In this secrete keys are reduces the complexity of
user secret key management by providing a secure attribute
delegation services between a master authority and a number
of multiple attribute authorities. In addition, the proxy re-
encryption technique is used to revoke any attribute.

You might also like