An Approach for Enhancing Privacy and Protection in Decentralized Multi-Authority Characteristic-based on Encryption in Cloud Computing
G. Swaraj Reddy1, Rajesh Tiwari2, Mrutyunjaya S Yalawar3
1G. Swaraj Reddy, Department of Computer Science and Engineering, CMR Engineering College, Hyderabad (Telangana), India.
2Dr. Rajesh Tiwari, Department of Computer Science and Engineering, CMR Engineering College, Hyderabad (Telangana), India.
3Mrutyunjaya S Yalawar, Department of Computer Science and Engineering, CMR Engineering College, Hyderabad (Telangana), India.
Manuscript received on 19 August 2022 | Revised Manuscript received on 29 August 2022 | Manuscript Accepted on 15 September 2022 | Manuscript published on 30 September 2022 | PP: 78-83 | Volume-11 Issue-3, September 2022 | Retrieval Number: 100.1/ijrte.C72780911322 | DOI: 10.35940/ijrte.C7278.0911322
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The Decentralizing multi-authority Attribute- Based secret writing has applied for finding issues arising from sharing various confidential company information in resources like cloud computing. The dispersive multi-authority trait- Grounded secret jotting systems that wont accept the central authority, conspiracy resistance may be achieved employing a transnational symbol. thus, identity must be managed encyclopedically, which ends in pivotal issues of sequestration and security. A theme is developed which do not use the central authority to manage druggies and keys and solely easy trust relations ought to get shaped by participating the general public key between every Authority. stoner individualities square measure distinctive by combining a stoner’s identity with the Attribute Authority wherever the stoner is set up. Once a crucial request must be created to an authority outside the sphere, the request must be performed by the authority within the current sphere rather of by the druggies, so, stoner individualities stay nonpublic to the Attribute Authority outside the sphere, which can enhance sequestration and security and also the crucial supplying. The theme relies on order direct brigades. an suggestion of security is bestowed that uses the binary System secret jotting methodology. Once the trait authorities in each sphere are members of a hierarchical multi-authority ABE, the goal for future work must be to develop a system that combines the plan presented in this study with the hierarchical multi-authority ABE.
Keywords: Attribute Based Encryption, Privacy, Multi-Authority.
Scope of the Article: Cloud Computing