Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
ABSTRACT:
In several distributed systems a user should only be able to access data if a user possess a certain set of credentials or attributes. Currently, the only method for enforcing such policies is to employ a trusted server to store the data and mediate access control. However, if any server storing the data is compromised, then the confidentiality of the data will be compromised. It presents a system for realizing complex access control on encrypted data that we call cipher text-policy attribute-based encryption. By using our techniques encrypted data can be kept confidential even if the storage server is untrusted. Moreover these kind of methods are secure against collusion attacks. Previous attribute-based encryption systems used attributes to describe the encrypted data and built policies into user's keys. While in this system attributes are used to describe a user's credentials, and a party encrypting data determines a policy for who can decrypt. Thus these methods are conceptually closer to traditional access control methods such as role-based access control. In addition to implementation of this system and performance measurements are provided.
NOTE: Without the concern of our team, please don't submit to the college. This Abstract varies based on student requirements.