Author : Rachel Evangeline Christian 1
Date of Publication :18th April 2018
Abstract: In this paper, our proposed system conveys a safe and secure information system with CP-ABE on the decentralized Network in which any number of authorized authorities can man access their own secret keys personally. Our results conveys the way to practice the suggested implementation strongly and effectively to address the secret facts disseminated in the disturbance of wireless area network. Many applications require increased protection of confidential data including access control methods that are cryptographically enforced.
Reference :
-
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.
- J. Bethencourt, A. Sahai, and B. Waters, “Ciphertextpolicy attributebased encryption,” in Proc. IEEE Symp. Security Privacy, 2007, pp. 321–334.
- A. Boldyreva, V. Goyal, and V. Kumar, “Identitybased encryption with efficient revocation,” in Proc. ACM Conf. Comput. Commun. Security, 2008, pp. 417– 426.
- M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,” in Proc. ACM MobiHoc, 2006, pp. 37–48.