IJIRST (International Journal for Innovative Research in Science & Technology)ISSN (online) : 2349-6010

 International Journal for Innovative Research in Science & Technology

Efficient Revocation of Data Access in Cloud Storage Based on ABE-Scheme


Print Email Cite
International Journal for Innovative Research in Science & Technology
Volume 4 Issue - 6
Year of Publication : 2017
Authors : Ms Sunitha. B ; Mrs. Sagarika Behera

BibTeX:

@article{IJIRSTV4I6015,
     title={Efficient Revocation of Data Access in Cloud Storage Based on ABE-Scheme},
     author={Ms Sunitha. B and Mrs. Sagarika Behera},
     journal={International Journal for Innovative Research in Science & Technology},
     volume={4},
     number={6},
     pages={70--75},
     year={},
     url={http://www.ijirst.org/articles/IJIRSTV4I6015.pdf},
     publisher={IJIRST (International Journal for Innovative Research in Science & Technology)},
}



Abstract:

As in this venture, particularly for encryption based cryptography strategy, could satisfy usefulness get to check in distributed stockpiling frameworks. Meanwhile client’s characteristics might give out by means of various property expert’s, poly-specialist cryptograph strategy trait built encoding is a rising cryptogram primeval for upholding quality construct get to control with respect to outsourced information. In any case, the majority of the current multi-specialist trait based frameworks exist one or the other uncertain property stage disavowal otherwise absence proficiency correspondence over-exhausted & calculation price. Present venture, we planned a quality built get to switch plot by means of 2-fig security aimed at poly-specialist distributed stockpiling frameworks. As our planned conspire; whichever client could recoup with subcontracted information which client grips adequate characteristic mystery solutions as to approach and approval enter as to the outsourced information. Likewise, the proposed plot appreciates the properties of steady size cipher-text and little calculation cost. Other than supporting the characteristic level renouncement, our proposed conspire enables information proprietor to do the client level repudiation.


Keywords:

Encryption Based Cryptography Strategy, 2--Fig Security at Poly-Specialist; Client Level Repudiation


Download Article