Open Access Open Access  Restricted Access Subscription or Fee Access

Improving Security and Efficiency in Distributed Data and Leakage Detection System

Abey A. Shala, M. Vivekapriya


Many data hiding techniques have recently been analyzed as they could help to manage part of the security rights. The randomization is expected to increase the security of the system and also increase the capacity. One of the most challenging issues in data sharing systems is the enforcement of access policies and the support of policies updates. Cipher text policy attribute-based encryption (CP-ABE) is becoming a promising cryptographic solution to this issue. Among the general framework of data hiding, key generation plays an vital role with trusted key generation center in order to select keys and transport those keys to all communication entities secretly. In key generation the major drawback which is called as the key escrow problem and in my proposed system it is overcome by Free key issuing protocol which is constructed using the secure two-party computation between the key generation center and the data storing center. The confidentiality of this transformation in data will be theoretically secured by providing authentication for transferring keys which are being generated. In my proposed system by applying encryption in the data sharing system introduces another challenge with regard to the user revocation, since the access policies are defined only over the attribute universe. The efficiency and security analyses indicate that the proposed scheme is efficient to securely manage the data distributed in the data sharing system.



Key Escrow Protocol, Revocation, CP-ABE, KP-ABE.

Full Text:



Junbeom Hur,” Improving Security and Efficiency in Attribute-Based Data Sharing”IEEE transactions on knowledge and data engineering, 2010 IEEE.

G.Balaia, Dr.V.SrinivasaRao,”A Protocol for Authenticated Group Key Transfer Protocol Based on Secret Sharing” International journal of advanced engineering science and technology, Vol No: 8, Issue No.2, 256-260.

J.Bethencourt,A.Sahai, B.Waters,”Cipher text-Policy Attribute-Based Encryption,” Proc. IEEE Symposium on Security and Privacy 2007, pp. 321–334, 2007.

C.Blundo, A.DeSantis, A.Herzberg, S.Kutten, “Perfectly Secure Key Distribution for Dynamic Conferences”, Information and computation, vol.146, pp1-23, oct.1998.

A. Lewko, A. Sahai, B. Waters, ”Revocation Systems with VerySmall Private Keys,”Proc. IEEE Symposium on Security andPrivacy 2010, pp. 273–285, 2010.

S. Yu, C. Wang, K. Ren, W. Lou, ”Attribute Based Data Sharingwith Attribute Revocation,”Proc. ASIACCS ’10, 2010.

X. Liang, Z. Cao, H. Lin, D. Xing, ”Provably Secure and EfficientBounded Ciphertext Policy Attribute Based Encryption,”Proc. ASIACCS, pp. 343–352, 2009.

S.S.M. Chow, “Removing Escrow from Identity-Based Encryption,”Proc. PKC 2009, LNCS 5443, Pp.256–276,2009.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.