Vol. 2 No. 3 (2020): Volume 2, Issue 3, Year 2020
Articles

Improved Cipher-Text Attribute Based Sensitive Document Protection and Secure Sharing in Cloud Storage

Sumathi M
Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, Tiruchirappalli, Tamil Nadu, India
Lekaa R
Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, Tiruchirappalli, Tamil Nadu, India.
Kavirakshana R
Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, Tiruchirappalli, Tamil Nadu, India.
Nishanthini N
Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, Tiruchirappalli, Tamil Nadu, India.
Nirmala K
Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, Tiruchirappalli, Tamil Nadu, India.
Published May 30, 2020
Keywords
  • Cipher-Text Policy ABE,
  • Dual Encryption,
  • Sensitive Attributes
How to Cite
M, S., R, L., R, K., N, N., & K, N. (2020). Improved Cipher-Text Attribute Based Sensitive Document Protection and Secure Sharing in Cloud Storage. International Research Journal of Multidisciplinary Technovation, 2(3), 7-13. https://doi.org/10.34256/irjmt2032

Plum Analytics

Abstract

The existing protection technique for income tax document depends on user id and date of birth. These details are easily identified by an adversary. Hence, dual encryption technique is proposed in this work. The cipher text policy attribute-based encryption is used for protection user information in an income tax document. Here, the secret key is sent two different ways such as through email and mobile OTP number. Those who are having these two keys are able to access the document. When compared to existing technique, this proposed system provides better security.

Downloads

Download data is not yet available.

References

  1. C. Vinoth, G.R.Anantha Raman, Key-Policy Attribute Based Encryption to Secure Data Stored In Cloud, International Journal of Advanced Technology in Engineering and Science, 2 (2014) 251-256.
  2. Yar-Ling Tan, Bok-Min Goi, Ryoichi Komiya, Raphael Phan, Design and Implementation of Key-Policy Attribute-Based Encryption in Body Sensor Network, International Journal of Cryptology Research, 4 (2013) 84-101.
  3. Huijun Zhu, Licheng Wang, Haseeb Ahmad, Xinxin Niu, Key-Policy Attribute-Based Encryption with Equality Test in Cloud Computing, IEEE Access, 5 (2017) 20428-20439.
  4. J. Parmar Vipul Kumar, Rajani Kanth Aluvalu, Key Policy Attribute Based Encryption (KP-ABE): A Review, International Journal of Innovative and Emerging Research in Engineering, 2 (2015) 49-52.
  5. Bo Hong, Jie Chen, Kai Zhang, Haifeng Qian, Multi-authority Non-Monotonic KP-ABE with Cryptographic Reverse Firewall, IEEE Access, 7 (2019) 159002-159012.
  6. Leyou Zhang, Pengfei Liang, Yi Mu, Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption, IEEE Access, 6 (2018) 12736-12745.
  7. Keying Li, Jianfeng Wang, Yinghui Zhang, Hua Ma, Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme, Journal of Internet Services and Information Security (JISIS), 4 (2014) 70-82.
  8. Changji Wang, Jianfa Luo, An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Cipher text Length, Hindawi Publishing Corporation Mathematical Problems in Engineering, 2013 (2013) 1-8.
  9. Jin Sun, Yupu Hu, Leyou Zhang, A Key-Policy Attribute-Based Broadcast Encryption, The International Arab Journal of Information Technology, 10 (2013) 444-452.
  10. Javier Herranz, Attribute-Based Encryption Implies Identity-Based Encryption, IET Information Security, 11 (2017) 332-337.