Removal of Escrow Problem and Revocation Problem in Distributed Data Sharing

نویسندگان

  • D. Saroja
  • P. Lakshmi
چکیده

Distributed data sharing has became an increasing challenge in modern distributed systems like cloud computing and online social networks etc., due to its data sharing archetype. The implementation of accessing policies and maintaining the policy updates has become a challenging issue in our Data sharing archetypes. Cipher text policy attributebased encryption (CP-ABE) is appropriate a capable cryptographic solution to this problem. Our CP-ABE facilitates the data owners to characterize their individual access policy over user attributes and implement the policies on the data to be distributed. Beside its advantage, on the other hand our CP-ABE have main disadvantage called a key escrow or written agreement problem. The key generation center possibly will decrypt whichever messages addressed to particular users by generating their confidential personal or private keys. This is not appropriate for data sharing situations where the data owner would like to make their private data only easy to get to chosen users. As the access policies are defined only over the attribute universe user revocation or cancellation has become another challenging issue in applying CP-ABE in data sharing system. As a result in our paper, we propose a new CP-ABE method for a data sharing system by developing the feature of the system architecture. The proposed method will achieve the following features: 1) By constructing the secure two-party computation between the key generation center (KGC) and the data storing center (DSC) we achieve escrow-free key issuing protocol through which key escrow or written agreement problem is solved and 2) On the top of ABE for alternative encryption we use selective attribute group key distribution to get elegant user revocation for each attribute. The performance and security analysis signify that the anticipated system is able to securely manage the data distribution in the data sharing system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Sharing using Key Policy based Authentication & CHAP

Data Sharing between number of users whether in distributed systems or in cloud environment needs security from various attacks. Attribute based data sharing is also an efficient technique which provides Cipher text policy attribute-based encryption from the prevention from key escrow problem and user revocation [1]. Although the technique is efficient but further enhancements is needed for the...

متن کامل

A Novel Approach for Securing Data using Cipher Text Policy Attribute Based Encryption

With the recent assumption and diffusion of data sharing paradigm in distributed systems such as cloud computing or online social networks, there have been increasing concerns and demands for distributed data security. The support of policies updates and enforcement of access policies is one of the most challenging issues in data sharing systems. Cipher text policy attribute-based encryption i....

متن کامل

A Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concerned in Grid

The End Entity Certificates (EECs) revocation mechanism in Grid Security Infrastructure (GSI) adopts Certificate Revocation List (CRL) currently. However, CRL is an inefficient mechanism with drawbacks of “time granularity problem” and unmanageable sizes. This paper presents a new EECs revocation mechanism MEECRM (Mediated RSA-based End Entity Certificates Revocation Mechanism) to eliminate “ke...

متن کامل

Ciphertext-Policy Attribute based Data-Sharing with Enhanced Productivity and Security

Online data sharing systems and social networks provides security through the cryptographic solutions. For this, Cipher text Policy Attribute Based Encryption is mostly suitable for distributed data sharing systems since the data owner has full control to put in force access policies and updating the policies. Even if the CP-ABE has various advantages, it has a major drawback known as the Key E...

متن کامل

Improving Data Security in Crypto-based Data Sharing with Third Party Auditing

The encryption standard provides key assumption to the analytical with the recent adoption and diffusion of the data sharing paradigm in distributed systems such as online social escrow problem. The key generation center could decrypt any messages addressed to specific users networks or cloud computing, there have been increasing demands and concerns for distributed data security. One of the mo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014