Javascript must be enabled to continue!
An efficient scheme to support direct revocation in cloud computing using CPABE: The approach with less time constraints
View through CrossRef
Secure Data sharing is a major issue of concern in cloud computing. CPABE is well known encryption technique for dealing with the problem of data security over network. Most of the files have multilevel access hierarchy especially in health care and military domain. The hierarchy structure and revocation of shared files is not scrutinized in CP-ABE. In this paper, experts proposed the enhanced method of encryption to support the direct revocation, in which sender specifies the revocation list during encryption of cipher text so that the problem of releasing periodic key update information in indirect revocation is vanished. Here the direct revocation mechanism and file access based hierarchy are merged to get enhanced CPABE. The multilevel access structure is integrated and merged with encrypted files with current access structure. Along with revocation, aim is also to improve the overall system performance with respect to encryption time and decryption time. Experimental result shows the enhanced performance of the proposed system as compared to existing system with respect to time and security constraints. Moreover the scheme is secure under the standard security assumption. Finally, based on the research, it gives forthcoming research direction to expand and implement the scheme in any practical application where security is main concern by proper coalition of the proposed technologies.
Science Publishing Corporation
Title: An efficient scheme to support direct revocation in cloud computing using CPABE: The approach with less time constraints
Description:
Secure Data sharing is a major issue of concern in cloud computing.
CPABE is well known encryption technique for dealing with the problem of data security over network.
Most of the files have multilevel access hierarchy especially in health care and military domain.
The hierarchy structure and revocation of shared files is not scrutinized in CP-ABE.
In this paper, experts proposed the enhanced method of encryption to support the direct revocation, in which sender specifies the revocation list during encryption of cipher text so that the problem of releasing periodic key update information in indirect revocation is vanished.
Here the direct revocation mechanism and file access based hierarchy are merged to get enhanced CPABE.
The multilevel access structure is integrated and merged with encrypted files with current access structure.
Along with revocation, aim is also to improve the overall system performance with respect to encryption time and decryption time.
Experimental result shows the enhanced performance of the proposed system as compared to existing system with respect to time and security constraints.
Moreover the scheme is secure under the standard security assumption.
Finally, based on the research, it gives forthcoming research direction to expand and implement the scheme in any practical application where security is main concern by proper coalition of the proposed technologies.
.
Related Results
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
Is cloud computing a game-changer for SME financial performance? Unveiling the mediating role of organizational agility through PLS-SEM
Is cloud computing a game-changer for SME financial performance? Unveiling the mediating role of organizational agility through PLS-SEM
PurposeCloud computing services are game-changing in empowering organizations to drive innovation and unlock new growth opportunities. Accordingly, this study aims to examine the d...
Assessing the Environmental Sustainability of Cloud Computing: A Life Cycle Assessment Approach
Assessing the Environmental Sustainability of Cloud Computing: A Life Cycle Assessment Approach
Cloud computing has emerged as a popular technology platform that allows businesses to store, access, and process data and applications over the internet. This technology has the p...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
Key based Cryptography in Cloud Computing
Key based Cryptography in Cloud Computing
Cloud computing is virtual computing infrastructure for increasing capabilities and developing potentialities dynamically while not adding new infrastructure, personnel, or code sy...
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...
Security and Privacy Issues in Cloud Computing
Security and Privacy Issues in Cloud Computing
<p>With a variety of software and hardware services available to users, cloud computing has developed in recent years as a very influential and transformational technology. I...
Security and Privacy Issues in Cloud Computing
Security and Privacy Issues in Cloud Computing
<p>With a variety of software and hardware services available to users, cloud computing has developed in recent years as a very influential and transformational technology. I...

