Cryptographic Pairing-Free Attribute Based Encryption
Venkata Rao J1, V. Krishna Reddy2, Rajasekhar Kommaraju3

1Venkata Rao J, Assistant Professor, Department of IT, NRI Institute of Technology, Agiripalli (Andhra Pradesh), India.
2Dr. V. Krishna Reddy, Professor, Department of CSE, K L University, Vaddeswaram, Guntur (Andhra Pradesh), India.
3Rajasekhar Kommaraju, Assistant Professor, Department of IT, Lakireddy Bali Reddy College of Engineering, Mylavaram (Andhra Pradesh), India.
Manuscript received on 21 June 2019 | Revised Manuscript received on 11 July 2019 | Manuscript Published on 17 July 2019 | PP: 1260-1265 | Volume-8 Issue-1C2 May 2019 | Retrieval Number: A122600581C219/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Protection is the most critical mission and impediment for cloud computing carrier adoption this is due to its vital tendencies together with useful useful resource pooling, virtualized nature, elasticity, and a few measured offerings. For a successful cloud deployment, customers need to have a examine a series of ten steps and in fact virtually one in all it had been mentioned in detail which focuses mainly on cloud protection, privacy, and information residency troubles. on this regard, the Ciphertext-insurance Attributed based totally completely totally Encryption (CP-ABE) toolkit has been installation and the respective going for walks surroundings is analysed. Pairing an inexperienced set of rules with the Elliptic Curves outcomes in Our Proposed Cryptographic Pairing-loose characteristic based totally Encryption (CPF-ABE) scheme gives the improved safety degrees, masses a whole lot much less storage expenses, resist with collusion assaults, and immoderate computational performance.
Keywords: Cloud Computing, Security, Privacy, Residency, Pairing, CP-ABE, ECC.
Scope of the Article: Encryption Methods and Tools