Auditing Method to Find Malicious Attribute Authority in Public Cloud Storage

K. Sowmya, Inkollu Umamaheshwara Rao, Ch. Srikanth, B. Nikitha, Ch. Rishith

Abstract


Information get to control is a testing issue openly distributed storage frameworks. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been received as a promising strategy to give adaptable, fine-grained and secure information get to control for distributed storage with genuine however inquisitive cloud servers. Be that as it may, in the current CP-ABE plans, the single trait expert must execute the tedious client authenticity check and mystery key conveyance, and consequently it brings about a solitary point execution bottleneck when a CP-ABE conspire is embraced in an extensive scale distributed storage framework. Clients might be stuck in the sitting tight line for a long stretch to acquire their mystery keys,thereby bringing about low-productivity of the framework. Despite the fact that multiauthority get to control plans have been proposed, these plans still can't beat the disadvantages of single-point bottleneck and low effectiveness, because of the way that every one of the experts still freely deals with a disjoint property set. In this paper, we propose a novel heterogeneous structure to evacuate the issue of single-point execution bottleneck and give a more productive access control conspire with an evaluating component. Our system utilizes various credit experts to share the heap of client authenticity check. In the interim, in our plan, a CA (Central Authority) is acquainted with produce mystery keys for authenticity confirmed clients. Dissimilar to other multiauthority get to control plots, every one of the experts in our plan deals with the entire characteristic set independently. To improve security, we likewise propose a reviewing component to distinguish which AA (Attribute Authority) has erroneously or noxiously played out the authenticity check method. Examination demonstrates that our framework ensures the security necessities as well as makes extraordinary execution change on key age.


Full Text:

PDF




Copyright (c) 2018 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org