Loading

Elliptic Curve based Collaborative Group Key Management for Cloud Data Sharing in Ciphertext Policy Attribute based Encryption
R. Mohan Naik1, S.V. Sathyanarayana2, T.K. Sowmya3
1R. Mohan Naik, Assistant Professor, Department of ECE, SDMIT, Ujire D.K.
2Dr. S.V. Sathyanarayana, Professor, Department of ECE, JNNCE, Shimoga.
3T. K. Sowmya, Assistant Professor, Department of ECE, SDMIT, Ujire D.K.
Manuscript received on 16 August 2019 | Revised Manuscript received on 28 August 2019 | Manuscript Published on 06 September 2019 | PP: 475-483 | Volume-8 Issue- 6S, August 2019 | Retrieval Number: F10980886S19/19©BEIESP | DOI: 10.35940/ijeat.F1098.0886S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Ciphertext policy attribute based encryption (CP-ABE) is one of cryptographic procedure that coordinates data information encryption with authenticated admission management for guaranteeing data information security in Cloud. The cloud computing where the application administrations using the Internet. In numerous applications, especially in Group Communication in cloud data information offering to various clients data information proprietors require to conceal undisclosed data information like encryption key. The effective key management system conventions are essential for giving security to this data information. Since, it is extremely difficult to provide security to group’s secret data information particularly with various mechanisms of assurance. The effectiveness issue of CP-ABE is as yet accessible that corrupt the computation overhead on the grounds that bilinear pairing is exorbitant in such huge numbers of utilizations of ABE, so by supplanting the bilinear pairing utilized in the attribute coordinating with straightforward scalar multiplication on Elliptic Curves, accordingly diminishing the general computation just as communication overhead. And plan another key dispersion can considered in order to legitimately renounce a client or a characteristic without refreshing the other clients’ keys during the property repudiation phase. By utilizing the Shamir’s Threshold secret sharing designs access structure to develop the expressiveness of the entrance arrangement. Security and execution examination demonstrate that in this plan improving the general effectiveness just as guarantee the security of the cloud data information.
Keywords: Key Management, Access Control, Elliptic Curve, CP-ABE.
Scope of the Article: Data Analytics