IJETST
  • Register
  • Login
##common.pageHeaderLogo.altText##
  • Home
  • About
    • Editorial Team
    • About the Journal
  • Current
  • Archives
  • Submissions
  • Contact
Advanced Search
  1. Home
  2. Archives
  3. Vol. 3 No. 08 (2016): August
  4. Articles

Vol. 3 No. 08 (2016)

August 2016

Literature Survey on Attribute Based Encryption (ABE)

  • S.Ilakiya1 , Dr P.Mayilvahanan

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4447-4449
Published 31 August 2016

  • View Article
  • Download
  • Cite
  • Reference
  • Statastics
  • Share

Abstract

During this Paper, we tend to show however Anony Control-F extends the User Revocation rule with a
data structure to enhance quantify ability and adaptability whereas at a similar time inherits the feature of
fine-grained access management. Second, we tend to demonstrate the way to implement a full-fledged
access management theme for cloud computing. The theme provides full support for stratified user grant,
file creation, file deletion, and user revocation in cloud computing. Third, we tend to formally prove the
protection of the projected theme supported the protection Cloud computing is associate rising computing
paradigm during which resources of the computing infrastructure ar provided as services over the net. As
promising as a result of it's, this paradigm together brings forth many new challenges for info security and
access management once users source sensitive information for sharing on cloud servers, that aren't
among a similar trustworthy domain as information homeowners. to stay sensitive user information
confidential against un-trusted servers, existing solutions generally apply field of study methods by
revealing info secret writing keys entirely to approved users. However, in doing therefore, these solutions
inevitably introduce a major computation overhead on the info owner for key distribution and knowledge}
management once fine grained data access management is desired, and so do not scale well. the matter of
at constant time achieving fine-grainedness, measurability, and data confidentiality of access management
very still remains unresolved. In This paper addresses this rewarding open issue by, on one hand, shaping
and implementing access policies supported knowledge attributes, and, on the opposite hand, permitting
the knowledge|the info|the information owner to represent most of the computation tasks concerned in fine
grained knowledge access management to un-trusted cloud servers while not revealing the underlying data
contents.

    PDF

How to Cite

S.Ilakiya1 , Dr P.Mayilvahanan. (2016). Literature Survey on Attribute Based Encryption (ABE). International Journal of Emerging Trends in Science and Technology, 3(08), 4447–4449. Retrieved from https://ijetst.in/index.php/ijetst/article/view/1165
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver

  • Download Citation

    • Endnote/Zotero/Mendeley (RIS)
    • BibTeX

    References

    • Article Viewed: 40 Total Download

    Downloads

    Download data is not yet available.

    ##plugins.themes.ojsPlusA.frontend.article.downloadstatastics##

    • Linkedin
    • Twitter
    • Facebook
    • Telegram

    Make a Submission

    Make a Submission

    Current Issue

    • Atom logo
    • RSS2 logo
    • RSS1 logo

    Information

    • For Readers
    • For Authors
    • For Librarians
    Keywords
    • Home
    • Archives
    • Submissions
    • About the Journal
    • Editorial Team
    • Contact
     Open Access Policy || Publication & Peer Review Policy || Publication Ethics
    The publication is licensed under a Creative Commons License (CC BY). View Legal Code
    Copyright © 2018 All Rights Reserved, International journal of Emerging Trends in Science and Technology | Powered By IJETST
    International journal of Emerging Trends in Science and Technology