Essay about Attribute Based Encryption Access Policy

Essay about Attribute Based Encryption Access Policy

Length: 1051 words (3 double-spaced pages)

Rating: Better Essays

Open Document

Essay Preview

In Attribute based encryption access Policy of algorithm is associated with Private Key of user where leaf nodes are attributes coming from fuzzy identity. Based on the attributes possessed by the user the access to the asset will be granted. The attribute based key policy encryption setup algorithm generates Alice’s master key. Alice’s identity is being decided by key policy which in turn is being decided from identity. Key Policy algorithm generates private key for Alice. Cherishma encrypt message M with set of attributes k. Priyanka can decrypt M if her key policy is satisfied with K.Alice can decrypt M if her key policy is satisfied with k. For Example Alice can decrypt the file encrypted with set of attributes {“Information Technology”, “Admission Committee”}.But Alice cannot decrypt the cipher text associated with attributes {“Information technology”, “Program”} .The difference between key policy and cipher text policy attribute based encryption is , in key policy attribute based encryption access policy depends on private key and in cipher text policy attribute based encryption access policy depends on cipher text. The Hierarchical attribute based encryption is a combination of hierarchical identity based encryption and cipher text policy attributes based encryption. The Hierarchical attribute based encryption is classified into trees according to their relationship defined in the access control system. For example employee database access control depends on hierarchical attribute based encryption. According to concept of hierarchical attribute based encryption manager has privilege to access the entire data in the company. Team leader has privilege to access the employee’s details and his own data in the company. Employee ...

... middle of paper ...

...the storage site. No secret key is generated. The user cannot generate the secret key needed for the decryption of the message. When the user wants to give or release the information to a receiver user can derive the secret key by using the same string that was used to create the public key. Key management is simplified, since the user can generate the secret key on-demand without keeping track of which keys were used to encrypt which data. The string must be consistent that is the only requirement.
Encryption is done by using Encrypt(m,str) and based on this the cipher text c is determined. Note step 1 and 2 are done only once for the derivation of public key Ystr.
Algorithm 1. Encrypt(m,public_key)
1. Determine the String str based on the agreement.
2. Generate public key Ystr.
3. Execute Encryption of the data using Encryption (m, Ystr) to obtain c.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Essay on Definition Of Semantics For Cp Abe

- Definition: Let {p1, p2, p3……………… Pn} be a set of parties. A collection A ≤ 2 {p1, p2, p3……………… Pn} If ꓯ B, C: B ∈ A and B ≤ C then C ∈ A An access structure (respectively monotonic access structure) is a collection A of non-empty subset of {p1, p2, p3……………… Pn} A≤ 2 {p1, p2, p3……………… Pn}|{0}. The set-in A are called the authorized set and the sets not in A are called the unauthorized sets.[11] Syntax for CP-ABE: CP-ABE scheme`s four algorithms are described as follow, and this ideal comes from [12]....   [tags: Cryptography, Encryption, Key, RSA]

Better Essays
1735 words (5 pages)

Essay on Security Options Within Microsoft SQL Server

- INTRODUCTION The integrity and effectiveness of the organizations use of Microsoft SQL Server heavily relies on the steps of the initial implementation. This encompasses many options that ensure security, including but not limited to encryption, authentication, user-defined roles, and auditing. The purpose of the following proposal is to suggest best practices of assuring security within Microsoft SQL Server 2012. Additionally, we will examine the functionality and reasoning behind each security best practice....   [tags: encryption, authentication, audit]

Free Essays
779 words (2.2 pages)

Multiple Users Can Use The Services Provided By Modern Computer Systems Essay

- B. Clifford Neuman et al. [1] stated that multiple users can use the services provided by modern computer systems which require the user’s identity to be verified accurately. Authentication is the process of verifying user’s identity that generated some data and this process is significant for security of computer systems. In traditional systems, password based authentication was used for verification but these passwords can be intercepted by eavesdroppers when sent across computer networks. Kerberos is a strong authentication method where authentication is based on cryptography and this method is suitable for insecure environments as it hides passwords efficiently....   [tags: Cryptography, Encryption, Computer]

Better Essays
1062 words (3 pages)

Security Issues Of The Security Essay

- Security in cloud is one of the significant zones of exploration. The study demonstrates that, the scientists are concentrating on productive algorithms and encryption strategies to improve the information security in cloud. S. Ruj et al [1] proposes another privacy preserving authenticated access control scheme for securing information in clouds. In this, the cloud confirms the correctness of client without knowing the client’s personality before storing information. Only valid client are able to decode the stored information....   [tags: Access control, Mandatory access control]

Better Essays
1623 words (4.6 pages)

Essay about Using Rbe Or Role Based Encryption

- Also, RBAC has the ability to support data encryption called RBE or role based encryption. This provides an even higher level of encryption while data is being passed and moved around. “In RBE scheme, the owner of the data encrypts the data in such a way that only those users can decrypt the data who possess appropriate access permission according to their role specified by role-based access control policies” (Shah, 2015). Keys are given to a particular user based on the roles architecture. This is more prevalent in cloud based system architecture....   [tags: Access control, Computer security, Risk]

Better Essays
826 words (2.4 pages)

Essay on Annotated Bibliography : History Of Encryption

- History of encryption: Encryption is said to be as long as civilization. In fact, writing has been considered to be one of the first forms of encryption, as only the rich and educated civilians could read and understand the text. Moreover, looking at more recent times, the Navajo windtalkers was a language used by the American military in the second world war to communicate. This particular language was used as it so intricate that only American natives could make any sense out of it hence disadvantaging the enemy [B2]....   [tags: Cryptography, Public-key cryptography, Encryption]

Better Essays
1521 words (4.3 pages)

How Important is the Encryption Debate? Essay

- How Important is the Encryption Debate. The encryption debate is intense and heated in certain circles, but is of no major concern to the vast majority of people in the United States. Most of the people I talk to regard its regulation to be of little consequence, or too complicated to take a position on. Indeed, the prevailing opinion I encounter is that is an area best left to the experts who understand its capabilities, uses and dangers. While no one really trusts the government, in the face of the sundry bogeymen evoked by law enforcement agents as a rationale for protecting the people, most people are hard pressed to stand up and speak of the inviolability of their privacy rights....   [tags: Encryption Market Essays]

Better Essays
1109 words (3.2 pages)

The Usage Of Cloud Based Storage Essay

- Smart phones, Smart watches, and other devices of their sort are deeply ingrained in our daily lives. Due to this deep integration, we have many constantly evolving struggles to overcome. Bring your own device policies bring about their own security concerns to corporations, such as physically losing the devices, integrating them into existing infrastructure, and making sure the devices are secure enough for a corporate environment. The usage of cloud based storage brings along challenges regarding the safe keeping of the private data of the people who use them....   [tags: Cryptography, Encryption]

Better Essays
1245 words (3.6 pages)

Internet Privacy: Government Should Not Regulate Encryption or Cryptography

- Internet Privacy: Government Should Not Regulate Encryption or Cryptography Privacy rights have been an important issue through out time, and it has been increasing in importance as we have moved into the electronic/information age. Keeping that privacy had become a growing concern for many businesses and consumers. With all the information being sent across the web, people are very concerned about their personal information falling into the wrong hands. One way to help protect your privacy on the net is by using an encryption program....   [tags: Internet Encryption Cryptography]

Better Essays
995 words (2.8 pages)

Research Project Encryption Essay

- Research Project Encryption Should the US government limit the strength of encryption products to eavesdrop on people’s everyday life. I remember exchanging secret letters with my friends in Japan as a child. We developed a code in which each letter of the Japanese alphabet was replaced by the one that follows it. For example, if we had used English, "Z" would have been replaced by "A". Each of us had the key to understanding this code but outsiders didn’t, so we didn’t have to worry if one of our brothers intercepted our letters....   [tags: Encryption Writing Code Privacy Essays]

Free Essays
1896 words (5.4 pages)