1.search Based On Efficient Verifiable Public Key Encryption With Keyword KP-ABE
This document discusses 7 papers related to attribute-based encryption schemes for secure data sharing in cloud computing. The papers propose improvements to existing attribute-based encryption methods like CP-ABE to address limitations and enable new capabilities such as keyword search, hierarchical key distribution, efficient revocation, and expression of complex access policies. Decentralized and collaborative approaches are introduced to improve scalability, security and performance for multi-user cloud environments.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
46 views4 pages
1.search Based On Efficient Verifiable Public Key Encryption With Keyword KP-ABE
This document discusses 7 papers related to attribute-based encryption schemes for secure data sharing in cloud computing. The papers propose improvements to existing attribute-based encryption methods like CP-ABE to address limitations and enable new capabilities such as keyword search, hierarchical key distribution, efficient revocation, and expression of complex access policies. Decentralized and collaborative approaches are introduced to improve scalability, security and performance for multi-user cloud environments.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4
1.
Search Based on Efficient Verifiable Public Key
Encryption with Keyword KP-ABE Description: in this paper we can search encrypted data using keyword search Existing system: peks(public key encryptionkeyword search) scheme is used. Proposed system: they took verifiable attribute-based keyword search (VABKS) as a base for this they improvised it into key policy attribute-based keyword search(KP-ABKS) in this public key and private key for the cloud server and data owner through the RSA algorithm to prevent the out adversary to execute the search operation, which enhances the security of scheme.
2.Hierarchical Authority Key-Policy Attribute-
Based Encryption Existing system: key-policy attribute-based encryption (KP-ABE) Proposed system: hierarchical authority key-policy attribute- based — encryption (HA-KP-ABE) by using this we can distribute private keys to users so that we cannot depend upon the central authority by this we can achieve security and Access tree is used in the phase of key generation and different users’ attribute sets are allowed to overlap, achieving fine- grained access control. Algorithm: decisional MBDH is used to prove security 3.A SEARCHABLE ENCRYPTION OF CP-ABE SCHEME IN CLOUD STORAGE Existing system: CP-ABE algorithm with homomorphic encryption Proposed system: in this paper they constructed Searchable Encryption CP-ABE (SE-CP-ABE) by using homomorphic encryption scheme by this they achieve users can retrieve the needed data from file which store in cloud, and do not need to download the cipher-text.
4.An Extended CP-ABE based Access Control
Model for Data Outsourced in the Cloud Existing system: CP-ABE algorithm Proposed system: Collaborative Ciphertext-Policy Attribute Role Based Encryption (C-CP-ARBE). In this every user gave a role with attributes this method is mainly used in multi authority and multi user segments by using this one can achieve scalable user Management and less user revocation with less cost and time and they compared this scheme with cp-abe and produce test results. This is mainly used when users are high as there roles and attributes are increased. 5.A CP-ABE SCHEME WITH SYSTEM ATTRIBUTES REVOCATION IN CLOUD STORAGE Existing system: attribute revocation become a problem by using existing schemes using cp-abe. Data Owners (DO) change their access strategies, they still need to redo the entire plaintext encryption process Proposed system: for this problem they use re-encryption key of minimum shared attribute set, which achieves a simple privilege revocation control, improve the efficiency and practicality of the entire scenario. For this they use AB-MSREAS scheme is based on AB-ACER.
6.Attribute-Based Data Sharing Scheme
Revisited in Cloud Computing Existing system: CP-ABE is limited to a potential security risk that is known as key escrow problem, most of the existing CP- ABE schemes cannot support attribute with arbitrary state. Proposed system: propose an improved two-party key issuing protocol that can guarantee that neither key authority nor cloud service provider can compromise the whole secret key of a user individually. weighted attribute was proposed to improve the expression of attribute, which can not only describe arbitrary- State attributes, but also reduce the complexity of access policy, so that the storage cost of ciphertext and time cost in encryp- tion can be saved. 7.Decentralized Attribute-Based Encryption Scheme with Scalable Revocation for Sharing Data in Public Cloud Servers Existing system: CP-ABE SCHEME PROPOSED SYSTEM: decentralized ciphertext-policy ABE scheme (CP-DABE) for a large-scale cooperative cloud environment. In this secrete keys are reduces the complexity of user secret key management by providing a secure attribute delegation services between a master authority and a number of multiple attribute authorities. In addition, the proxy re- encryption technique is used to revoke any attribute.