International Journal of Advance Computational Engineering and Networking (IJACEN)
current issues
Volume-8,Issue-4  ( Apr, 2020 )
Past issues
  1. Volume-8,Issue-3  ( Mar, 2020 )
  2. Volume-8,Issue-2  ( Feb, 2020 )
  3. Volume-8,Issue-1  ( Jan, 2020 )
  4. Volume-7,Issue-12  ( Dec, 2019 )
  5. Volume-7,Issue-11  ( Nov, 2019 )
  6. Volume-7, Issue-10  ( Oct, 2019 )
  7. Volume-7, Issue-9  ( Sep, 2019 )
  8. Volume-7, Issue-8  ( Aug, 2019 )
  9. Volume-7, Issue-7  ( Jul, 2019 )
  10. Volume-7, Issue-6  ( Jun, 2019 )

Statistics report
Aug. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 87
Paper Published : 1231
No. of Authors : 3095
  Journal Paper

Paper Title
Enhancing Access Control And Efficiency In Attribute Based Data Sharing Using JMA

Online data sharing systems and social networks such as FB, twitter etc., provide security through the cryptographic solutions using Cipher text Policy Attribute Based Encryption (CP-ABE). This is most suited for distributed data sharing systems since the data owner has full control in enforcing access policies and updating the policies. Despite of the various advantageous of the CP-ABE, it has a major drawback known as the Key Escrow problem. The Key Generation Center could decrypt any message addressed to specific users by generating their private keys. This is not suitable for data sharing scenarios where the data owners would like to make their private data only accessible to designated users key. In this paper, the key escrow problem is resolved by using a modified Escrow free Key generation Protocol. The modified Escrow free Key generation protocol ensures that neither the Key Generation Center (KGC) nor the Data storing center can generate the secret keys individually. Instead the Key Generation Center and the Data storing center generate parts of secret key which are then integrated by the user. The obtained result has the Escrow free Key issuing protocol that completely eliminates Key Escrow problem and is efficient. And also as the data owner would like to make their private data only accessible to designated users. Hence to overcome this problem fine-grained data access control provides a way of defining access policies based on different attributes of the users or the data object and the security is enhanced in order to send private keys by the data owner or the users by adding a special application known as JMA (Java Mail API) that provides E- mail enhanced security. Keywords- Access Control, Cipher Text Policy Attribute-Based Encryption (CP-ABE), Data Owner, Data Storing Center, Email Enhanced Security by JMA(Java Mail API), Escrow Free Key Issuing Protocol, Key Generation Center, Key Revocation.

Author - Nazneen Banu, K.Vinay Kumar

| PDF |
Viewed - 61
| Published on 2014-12-02
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World