ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Special Issue Article Open Access

Removal of Escrow Problem and Revocation Problem in Distributed Data Sharing

Abstract

Distributed data sharing has became an increasing challenge in modern distributed systems like cloud computing and online social networks etc., due to its data sharing archetype. The implementation of accessing policies and maintaining the policy updates has become a challenging issue in our Data sharing archetypes. Cipher text policy attributebased encryption (CP-ABE) is appropriate a capable cryptographic solution to this problem. Our CP-ABE facilitates the data owners to characterize their individual access policy over user attributes and implement the policies on the data to be distributed. Beside its advantage, on the other hand our CP-ABE have main disadvantage called a key escrow or written agreement problem. The key generation center possibly will decrypt whichever messages addressed to particular users by generating their confidential personal or private keys. This is not appropriate for data sharing situations where the data owner would like to make their private data only easy to get to chosen users. As the access policies are defined only over the attribute universe user revocation or cancellation has become another challenging issue in applying CP-ABE in data sharing system. As a result in our paper, we propose a new CP-ABE method for a data sharing system by developing the feature of the system architecture. The proposed method will achieve the following features: 1) By constructing the secure two-party computation between the key generation center (KGC) and the data storing center (DSC) we achieve escrow-free key issuing protocol through which key escrow or written agreement problem is solved and 2) On the top of ABE for alternative encryption we use selective attribute group key distribution to get elegant user revocation for each attribute. The performance and security analysis signify that the anticipated system is able to securely manage the data distribution in the data sharing system.

D.Saroja, P.Lakshmi

To read the full article Download Full Article | Visit Full Article