Using Multiple Attribute Authorities Make Access Control And Secret Key Distribution In Public Cloud Storage

Authors

  • Dr. S. Devasahayam Selvakumar Author
  • C .Jeba Evangeline Author

Keywords:

Encryption based on Ciphertext Policy Attribute Attribute

Abstract

Information get to control is a testing issue out in the opendistributed storage frameworks. Ciphertext-
Policy Attribute-BasedEncryption(CP-ABE)hasbeenreceivedasapromising system to give adaptable, fine-
grained and secureinformation getto control for distributed storagewith fairyet inquisitive cloud servers.
Be that as it may, in the currentCP-ABE plans, the single quality expert must execute
thetediousclientauthenticityconfirmationandmysterykeyconveyance,andhenceforthitresultsinasolitaryp
ointexecution bottleneck when a CP-ABE plot is received
inasubstantialscaledistributedstorageframework.Clientsmightbestuckinthetrustingthatasignificantlotwill
acquiretheirmysterykeys,consequentlybringingaboutlow-productivity of the framework. In spite of the
fact thatmultiauthority get to control plans have been proposed,
theseplansstillcan'tdefeatthedownsidesofsingle-pointbottleneck and low effectiveness, because of the
way thatevery one of the specialists still freely deals with a disjointtrait set. In this paper, we propose a
novel heterogeneousstructuretoevacuatetheissueofsingle-pointexecutionbottleneck and give an
increasingly proficient access
controlplotwithanexaminingcomponent.Oursystemutilizesnumerouscreditspecialiststosharetheheapofcli
entauthenticity confirmation. In the interim ,in our plan, a CA(Central Authority) is acquainted with
produce mystery
keysforauthenticitycheckedclients.Dissimilartoothermultiauthoritygettocontrolplots,everyoneoftheexpe
rtsinourplandealswiththeentirecharacteristicsetexclusively. To improve security, we additionally propose
anevaluatinginstrumenttoidentifywhichAA(AttributeAuthority) has inaccurately or malignantly played
out
theauthenticityconfirmationstrategy.Investigationdemonstratesthatourframeworknotjustensuresthesec
urity necessities butalso makes extraordinary executionenhancementforkeyage.

Downloads

Published

06-01-2022

How to Cite

Using Multiple Attribute Authorities Make Access Control And Secret Key Distribution In Public Cloud Storage. (2022). Indo-American Journal of Life Sciences and Biotechnology, 19(1), 1-6. https://iajlb.org/index.php/iajlb/article/view/96