Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

TMACS: A Robust & Verifiable Threshold Multi- Authority Access Control System in Public Cloud Storage

Author : L.Rohit 1 Mr.V.Sridhar Reddy 2 Mr.N.Srinivas 3

Date of Publication :10th January 2018

Abstract: Attribute based Encryption is viewed as a promising cryptographic leading apparatus to ensure information[2] proprietors' direct control over their source openly distributed[1] storage. Prior ABE plans include only a solitary specialist to carry on the entire characteristic[4] set, which can bring a solitary point bottleneck on both security[3] and execution. Consequently, some multi-specialist plans are projected, in which keep up disjoint trait subsets. Regardless, In this paper, numerous experts independently from another viewpoint, we lead an edge multi-master CP-ABE to get the chance to run plan for open conveyed stockpiling, named TMACS, in which various authorities commonly handle a uniform characteristic set. In TMACS, exploiting limit mystery sharing, the ace key can be divided among various specialists, and a legitimate client can create his/her mystery key by cooperating with any t experts. Security and execution investigation comes about demonstrate that TMACS isn't just obvious secure[6] when not as much as t experts are traded off, yet in addition powerful when no not as many as t specialists are alive in the framework. Moreover, by proficiently joining the customary multi-specialist conspire with TMACS, we build a crossover one, which fulfills the situation of characteristics originating from different specialists and in count accomplishing security and framework level vigor

Reference :

    1. P.Mell and T.Grance, "The NIST meaning of distributed computing," National Institute of Standards and Technology, vol. 53, no. 6, p. 50, 2009.
    2. S. Kamara and Lauter, "Cryptographic dispersed stockpiling," in Proceedings of14th fiscal cryptography and information protection Springer, 2010, pp. 136– 149.
    3. K. Ren, C. Wang, and Q. Wang, "Security challenges for public cloud," IEEE network Computing, vol. 16, no. 1, pp. 69– 73, 2012.
    4. A. Sahai and B. Waters, "Fleecy character based encryption," in Proceedings of 24th Annual global symposium on hypothesis and functions of Cryptographic methods. Springe, 2005, pp. 457– 473.
    5. R. Ostrovsky, Sahai, and Waters, "Quality based encryption with non-monotonic entrance structures," in procedures of fourteenth ACM meeting on cpu and exchanges security. ACM, 2014, pp. 195– 203.
    6. A. Lewko, Okamoto, Sahai, K. Takashima, and Waters, "Totally secure commonsense encryption: quality-based encryption and (different leveled) internal thing encryption," in Proceedings of 29th Annual International Gathering on the premise and appliances of Cryptographic methods. Springer, 2010, pp. 62– 91.
    7. V. Goyal, O. Pandey, Sahai and Waters, "Characteristic found encryption for finegrained get to control of encoded information," in complaints of thirteenth ACM meeting on mainframe and correspondences protection. ACM, 2006, pp. 89– 98.
    8. N. Attrapadung, B. Libert, and E. Panafieu, "Expressive keypolicy quality based encryption with steady size ciphertexts," in Proceedings of fourteenth global convention on exercise and concept in Open Key Cryptography. Springer, 2011, pp. 90– 108.
    9. J. Bethen court, Sahai, and Waters, "Ciphertextstrategy quality based encryption," in procedures of IEEE convention on protection and solitude. IEEE, 2007, pp. 321– 334.
    10. B. Waters, "Figure content strategy quality based encryption”: An expressive, proficient, and provably secure acknowledgment," in Proceedings of fourteenth International Meeting on perform and speculation in open Key Cryptography. ,2011, pp. 53– 70.

Recent Article