Loading

A Secure and Efficient Multi Authority Encryption Scheme in Cross Domain Data Sharing
L. Godlin Atlas1, Arjun K.P.2, Sreenarayanan N.M.3, N. Thillaiarasu4

1L.Godlin Atlas*, SCSE, Galgotias University, Greater Noida, India.
2Arjun. K.P, SCSE, Galgotias University, Greater Noida, India.
3Sreenarayanan N.M., SCSE, Galgotias University, Greater Noida, India.
4N.Thillai Arasu., SCSE, Galgotias University, Greater Noida, India.

Manuscript received on March 30, 2020. | Revised Manuscript received on April 05, 2020. | Manuscript published on April 30, 2020. | PP: 1283-1289 | Volume-9 Issue-4, April 2020. | Retrieval Number: D8439049420/2020©BEIESP | DOI: 10.35940/ijeat.D8439.049420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Attribute Based Encryption (ABE) in light of the fact that the rule locals to make sure about the patient data set aside on a semi-trusted. In ABE plot, each patient is regularly recognized by name which fuses the patient attributes. At the reason when Patient re-proper the delicate data for sharing on cloud system on cloud structures. Taking care of the patient records on suspicious limit makes secure transfer of data to be a test issue. To remain tricky customer data mystery against suspicious cloud structure. the current system when in doubt apply cryptographic techniques by revealing data unscrambling keys just to affirmed customer. the basic troubles for cryptographic technique fuse at a proportional time achieving structure flexibility and fine-grained data get the opportunity to manage, gainful key or customer the load up, data security, computational overhead then forward. To manage these issues, promptly applied and maintaining access approaches snared in to attributes and sanctioning the information owner to designate most count genuine assignments to customer disavowal to untrusted server without uncovering data substance to around then. We achieve this target by introducing multi authority characteristic based encryption. Our proposed plot in like manner has momentous features of customer get the chance to benefit characterization, dynamic modification of access game plans or archive properties and customer puzzle key duty, supports capable on-demand customer or trademark denial and break-glass access under emergency circumstances.
Keywords: Cloud processing, Personal wellbeing records, information security, fine-grained get to control, characteristic based encryption, numerous authority ABE, client repudiation, untrusted capacity.