Loading

Multi Attribute Based Technique in Key Generation System
Aparna.V1, Jabisha Arul2, Nandhini. S3, Vishnu Kumar. A4
1Aparna.V, Information Techonology, Vel Tech Hightech Dr. Rangaragan Dr. Sakunthala Engineering College, Chennai, India.
2Jabisha Arul, Information Techonology, Vel Tech Hightech Dr. Rangaragan Dr. Sakunthala Engineering College, Chennai, India.
3Nandhini. S, Information Techonology, Vel Tech Hightech Dr. Rangaragan Dr. Sakunthala Engineering College, Chennai, India.
4Vishnu Kumar. A, Information Techonology, Vel Tech Hightech Dr. Rangaragan Dr. Sakunthala Engineering College, Chennai, India.
Manuscript received on March 27, 2013. | Revised Manuscript received on April 15, 2013. | Manuscript published on April 30, 2013. | PP: 613-617 | Volume-2, Issue-4, April 2013. | Retrieval Number: D1527042413/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The main objective of this paper is to improve the security and the efficiency while sharing the data between data owner and the users. Based upon the attributes of the users we are going to share the data. One of the most challenging issues in confidential data sharing systems is the enforcement of data access policies and the support of policies updates. Cipher text policy attribute based encryption (CP-ABE) is becoming a promising cryptographic solution to this kind of problem. It enables data owners to define their own access policies over their user attributes and enforce the policies on the data to be distributed. However, the advantage of the system comes with a major drawback which is known as a key escrow problem. The key generation center might decrypt any kind of messages addressed to specific users by generating their private keys. This is not suitable for data sharing typical scenarios where the data owner would like to make their private data only accessible to designated users. In addition, applying CP-ABE in data sharing system introduces another challenge with regard to the user revocation. From this study, we propose a novel CP-ABE scheme for a data sharing system by exploiting the characteristic of the system architecture. The performance and security analysis indicate that the proposed scheme is efficient to securely manage the data distributed in the data sharing system.
Keywords: Attribute Based Encryption, Escrow Free Key Issuing Protocol, Ant Colony Algorithm, Revocation.