{"title":"Efficient Attribute Based Encryption Outsourcing in Cloud Storage with User Revocation","authors":"Shweta Sharad Chavan, J. Jayaseeli","doi":"10.1109/CCGE50943.2021.9776354","DOIUrl":null,"url":null,"abstract":"By providing a function called Cloud Storage, the company let participants outsource their confidential data to a third party and use the on-demand services and applications of data on the organization's cloud storage server. With this, researchers would be able to encrypt details, which would will be crucial in preventing security breaches of confidential details. In this exchange conference, businesses have to encrypt their data before they process it to the Cloud framework. Attribute Based Encryption (ABE) system is a symmetric key dependent cryptosystem used in cloud system that lets device users, software, data and programmers access managed digital data. Unfortunately, BAE suffers from a performance downside with outsourcing the operation of decrypting the secret. There has been a lot of suggestions put forward as to how to boost the performance of the method. It would be to the same investigation that was stated in the research study. We take the case of the Robust Paraphrasing and conclude there is a new implementation of the Electronic Referencing tool, even though it depends on the Actuals. The load testing strategy is used to minimize the expense of outsourcing the decryption phase to a third-party data decryption service provider. Load balancing may occur by considering features such as file space, memory, hard drive disc usage, etc. For the intent of revocation of key for a community, we often discuss the problem of the key consumer quitting the group. Therefore, in the case of the key user leaving the group, the latest key to open a group should be modified and circulated to all current key holders. The experimental findings of this proposed method proves that the time and memory consumptions of this proposed system were comparable to, if not higher than, the current system of time consumptions and memory usage.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCGE50943.2021.9776354","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
By providing a function called Cloud Storage, the company let participants outsource their confidential data to a third party and use the on-demand services and applications of data on the organization's cloud storage server. With this, researchers would be able to encrypt details, which would will be crucial in preventing security breaches of confidential details. In this exchange conference, businesses have to encrypt their data before they process it to the Cloud framework. Attribute Based Encryption (ABE) system is a symmetric key dependent cryptosystem used in cloud system that lets device users, software, data and programmers access managed digital data. Unfortunately, BAE suffers from a performance downside with outsourcing the operation of decrypting the secret. There has been a lot of suggestions put forward as to how to boost the performance of the method. It would be to the same investigation that was stated in the research study. We take the case of the Robust Paraphrasing and conclude there is a new implementation of the Electronic Referencing tool, even though it depends on the Actuals. The load testing strategy is used to minimize the expense of outsourcing the decryption phase to a third-party data decryption service provider. Load balancing may occur by considering features such as file space, memory, hard drive disc usage, etc. For the intent of revocation of key for a community, we often discuss the problem of the key consumer quitting the group. Therefore, in the case of the key user leaving the group, the latest key to open a group should be modified and circulated to all current key holders. The experimental findings of this proposed method proves that the time and memory consumptions of this proposed system were comparable to, if not higher than, the current system of time consumptions and memory usage.