Performance of Symmetric and Asymmetric Encryption Techniques for Attribute Based Encryption
Devendrasinh Vashi1, H B Bhadka2, Kuntal Patel3, Sanjay Garg4
1Devendrasinh Vashi, Computer Science Department, Nirma University, Ahmedabad, India.
2Dr. H B Bhadka, Faculty of Computer Science, C U Shah University, Wadhwan, India.
3Dr. Kuntal Patel, School of Computer Studies, Ahmedabad University, Ahmedabad, India.
4Dr. Sanjay Garg, Computer Science Department, Nirma University, Ahmedabad, India. 

Manuscript received on November 15, 2019. | Revised Manuscript received on November 23, 2019. | Manuscript published on November 30, 2019. | PP: 176-182 | Volume-8 Issue-4, November 2019. | Retrieval Number: C6597098319/2019©BEIESP | DOI: 10.35940/ijrte.C6597.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: The objective of this research article is to study performance of the the symmetric and asymmetric encryption based on the attributed encryption. In the current scenario, to protect the data in the distributed data base is the challenging task. Mainly to provide the privacy based on the specific parameter like attributed based encryption. In this algorithm dataset is provided to do the encryption for the selected sensitive attribute. Them for each symmetric and asymmetric encryption techniques encryption execution time and memory occupied after encryption is observed for ten different dataset. In the experiment and result analysis, each encryption techniques was discussed based on the comparion of encryption time and memory occupied after encryption. Result shows that RC2 encryption is less costlier as compare to AES, 3DES, Rijndael and RSA encryption. Result also indicates that 3DES and RC2 are almost need same encryption time and less costlier as compare to RSA, AES and Rijndael encryption and RSA encryption is more costlier as compare to AES, 3DES, Rijndael and RC2 encryption.
Keywords: Privacy Preserving, Data, Data Mining, Encryption, PPDM, Symmetric Encryption, Asymmetric Encryption.
Scope of the Article: Data Mining.