{"title":"角色检查:使用基于属性的加密,动态密钥生成和用户收回系统保护用户信息","authors":"P. Akhila, M. Bhavani, R. Canessane","doi":"10.1109/ICONSTEM.2016.7560936","DOIUrl":null,"url":null,"abstract":"The EXISTING SYSTEM solely store the info within the cloud any user will access the info. within the projected SYSTEM the info is keep within the Remote Cloud. knowledge Owner will share the info and it's Key to the allowable Users. knowledge Sharing is achieved for 3 varieties of Users. 1. User based mostly 2. Role based mostly (Position / Role), 3. Attribute (Experience). within the MODIFICATION method of the Project is knowledge is uploaded by the info Owner supported Public Key, Secret Key, world Key and cluster Key. Public secret is haphazardly generated. Secret Key & cluster secret is generated via our Role / Attribute. For each User Name & Designation is employed. world secret is generated haphazardly. we tend to code the uploaded file exploitation AES algorithmic program. User Revocation is additionally developed during this half. If a user is moving out of the cluster or removed out of the cluster, secret is altered and therefore the new secret is armored to this Members. throughout knowledge transfer, except for validate all the Keys, Token is generated as E Mail, that is employed for additional Authentication.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Role check: Protecting the user information using attribute-based encryption, dynamic key generation & user retraction system\",\"authors\":\"P. Akhila, M. Bhavani, R. Canessane\",\"doi\":\"10.1109/ICONSTEM.2016.7560936\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The EXISTING SYSTEM solely store the info within the cloud any user will access the info. within the projected SYSTEM the info is keep within the Remote Cloud. knowledge Owner will share the info and it's Key to the allowable Users. knowledge Sharing is achieved for 3 varieties of Users. 1. User based mostly 2. Role based mostly (Position / Role), 3. Attribute (Experience). within the MODIFICATION method of the Project is knowledge is uploaded by the info Owner supported Public Key, Secret Key, world Key and cluster Key. Public secret is haphazardly generated. Secret Key & cluster secret is generated via our Role / Attribute. For each User Name & Designation is employed. world secret is generated haphazardly. we tend to code the uploaded file exploitation AES algorithmic program. User Revocation is additionally developed during this half. If a user is moving out of the cluster or removed out of the cluster, secret is altered and therefore the new secret is armored to this Members. throughout knowledge transfer, except for validate all the Keys, Token is generated as E Mail, that is employed for additional Authentication.\",\"PeriodicalId\":256750,\"journal\":{\"name\":\"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICONSTEM.2016.7560936\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICONSTEM.2016.7560936","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Role check: Protecting the user information using attribute-based encryption, dynamic key generation & user retraction system
The EXISTING SYSTEM solely store the info within the cloud any user will access the info. within the projected SYSTEM the info is keep within the Remote Cloud. knowledge Owner will share the info and it's Key to the allowable Users. knowledge Sharing is achieved for 3 varieties of Users. 1. User based mostly 2. Role based mostly (Position / Role), 3. Attribute (Experience). within the MODIFICATION method of the Project is knowledge is uploaded by the info Owner supported Public Key, Secret Key, world Key and cluster Key. Public secret is haphazardly generated. Secret Key & cluster secret is generated via our Role / Attribute. For each User Name & Designation is employed. world secret is generated haphazardly. we tend to code the uploaded file exploitation AES algorithmic program. User Revocation is additionally developed during this half. If a user is moving out of the cluster or removed out of the cluster, secret is altered and therefore the new secret is armored to this Members. throughout knowledge transfer, except for validate all the Keys, Token is generated as E Mail, that is employed for additional Authentication.