Improved Cipher-Text Attribute Based Sensitive Document Protection and Secure Sharing in Cloud Storage
- Cipher-Text Policy ABE,
- Dual Encryption,
- Sensitive Attributes
Copyright (c) 2020 Sumathi M, Lekaa R, Kavirakshana R, Nishanthini N, Nirmala K
This work is licensed under a Creative Commons Attribution 4.0 International License.
The existing protection technique for income tax document depends on user id and date of birth. These details are easily identified by an adversary. Hence, dual encryption technique is proposed in this work. The cipher text policy attribute-based encryption is used for protection user information in an income tax document. Here, the secret key is sent two different ways such as through email and mobile OTP number. Those who are having these two keys are able to access the document. When compared to existing technique, this proposed system provides better security.
- C. Vinoth, G.R.Anantha Raman, Key-Policy Attribute Based Encryption to Secure Data Stored In Cloud, International Journal of Advanced Technology in Engineering and Science, 2 (2014) 251-256.
- Yar-Ling Tan, Bok-Min Goi, Ryoichi Komiya, Raphael Phan, Design and Implementation of Key-Policy Attribute-Based Encryption in Body Sensor Network, International Journal of Cryptology Research, 4 (2013) 84-101.
- Huijun Zhu, Licheng Wang, Haseeb Ahmad, Xinxin Niu, Key-Policy Attribute-Based Encryption with Equality Test in Cloud Computing, IEEE Access, 5 (2017) 20428-20439.
- J. Parmar Vipul Kumar, Rajani Kanth Aluvalu, Key Policy Attribute Based Encryption (KP-ABE): A Review, International Journal of Innovative and Emerging Research in Engineering, 2 (2015) 49-52.
- Bo Hong, Jie Chen, Kai Zhang, Haifeng Qian, Multi-authority Non-Monotonic KP-ABE with Cryptographic Reverse Firewall, IEEE Access, 7 (2019) 159002-159012.
- Leyou Zhang, Pengfei Liang, Yi Mu, Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption, IEEE Access, 6 (2018) 12736-12745.
- Keying Li, Jianfeng Wang, Yinghui Zhang, Hua Ma, Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme, Journal of Internet Services and Information Security (JISIS), 4 (2014) 70-82.
- Changji Wang, Jianfa Luo, An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Cipher text Length, Hindawi Publishing Corporation Mathematical Problems in Engineering, 2013 (2013) 1-8.
- Jin Sun, Yupu Hu, Leyou Zhang, A Key-Policy Attribute-Based Broadcast Encryption, The International Arab Journal of Information Technology, 10 (2013) 444-452.
- Javier Herranz, Attribute-Based Encryption Implies Identity-Based Encryption, IET Information Security, 11 (2017) 332-337.