Corpus ID: 198972651

Audit-Free Cloud Storage via Deniable Attribute based Encryption

  title={Audit-Free Cloud Storage via Deniable Attribute based Encryption},
  author={G. Prashanth},
Cloud storage services have become increasingly popular. Because of the importance of privacy, many cloud storage encryption schemes have been proposed to protect data from those who do not have access. All such schemes assumed that cloud storage providers are safe and cannot be hacked; however, in practice, some authorities (i.e., coercers) may force cloud storage providers to reveal user secrets or confidential data on the cloud, thus altogether circumventing storage encryption schemes. In… Expand
Storage Via Deniable Encryption for Audit-Free Cloud Services
Cloud storage services have grown popularly. For the importance reason of privacy, many cloud storage encryption schemas has been proposed to secure the data from those who do not have access. AllExpand
A Review on Attribute Based Encryption
An Attributes-Based access to the media within the cloud wherever it uses cipher-text policy Attribute-Based encryption (CP-ABE) technique to make associate access management assign a key to every user attribute and encrypts the info supported the appropriately distributed keys to a cloud. Expand
The security cloud storage auditing with key generation using ABE — An implementation
This paper exhibits that the location of obscurity clients with the utilization of the productive deniable encryption conspire, while the phony clients tries to get data from the cloud they will be furnished with some phony files. Expand
Identity-Based Encryption with Cloud Revocation Authority and Its Applications
This article proposes a new revocable IBE scheme with a cloud revocation authority (CRA) to solve the two shortcomings, namely, the performance is significantly improved and the CRA holds only a system secret for all the users. Expand
Implementation of an Attribute-Based Encryption Scheme Based on SM9
In recent years, attribute-based encryption (ABE) has been widely applied in mobile computing, cloud computing, and the Internet of things, for supporting flexible and fine-grained access control ofExpand
A Revocation Scheme for Gateway Applications in Cloud using ID
Cloud provides most of the services to its customers on demand via internet which are expected to be always on and have a critical nature. But before the customer or user gains permission to accessExpand
Blurring Political Leanings of Messages on Social Networks Using Deniable Steganography
This paper employs the concept of deniable encryption to generate neutral-like articles composed of two critics toward both sides of the discussion, while one of the critics is the actual message from the author to particular recipients. Expand