attribute based encryption java source code
#1

Hi,

I'm in Need of Attribute Based Encryption for Java Source Code urgently for my final year project

Thanks in advance,
Raju kumar
Reply
#2
This work presents a new attribute-based Attributes Encryption (MCP-ABE) technique and uses the MCP-ABE to design an access control scheme for scalable media sharing based on attributes of data consumers (eg age, nationality , Or gender) rather than an explicit list of consumer names. The schema is efficient and flexible because MCP-ABE allows a content provider to specify an access policy and encrypt multiple messages within an encrypted text so that only those users whose attributes satisfy the access policy can decrypt the encrypted text. On the other hand, the document shows how to support mobile devices with limited resources by downloading intensive computational operations to the cloud servers, without compromising the privacy of the data.


EXISTING SYSTEM:

A promising approach to access control in content exchange services is to enable users to apply access controls to their data directly, rather than through a central administrator. However, this requires flexible and scalable cryptographic key management to support complex access control policies. A native access control solution is to assign a key for each user attribute, to distribute the appropriate keys to the users who have the corresponding attributes, and to encrypt the media with the attribute keys repeatedly. Another method is to classify users into different roles Based on its attributes, Assign function keys to the users and then encrypt the content using the function keys. However, this approach results in high complexity, ie the number of keys for each user and the number of texts encrypted for a message are in the order of where is the number of all possible user attributes. Both solutions suffer from the rigid and inflexible definition of underlying access control policies. A remedy for this problem is using encryption policy-based encryption (CP-ABE). In CP-ABE, a Ciphertext is embedded with an access control policy, or access policy to abbreviate, associated with the attributes of the user. A recipient of the ciphertext is able to decrypt the ciphertext only if its attributes satisfy the access policy in the ciphertext. CP-ABE can be seen as a one-to-many public-key encryption scheme and, therefore, allows a data owner to grant access to an unknown set of users. However, existing CP-ABE schemes simply deliver an encrypted text encrypted message to all authorised users and are not optimal for efficiently sharing scalable media.

DISADVANTAGES OF THE EXISTING SYSTEM:

V In an existing system solution is flexible, but is vulnerable to collusion attack.
V The existing method is to classify users into different roles based on their attributes, assign function keys to users, and then encrypt the content using the function keys. However, this approach results in high complexity.
V The existing CP-ABE schemes simply deliver an encrypted message by encrypted text to all authorised users and are not optimal for efficient sharing of scalable media.

PROPOSED SYSTEM:

In this article we present an access control scheme for scalable media. The scheme has several benefits that make it especially suitable for content delivery. For example, it is extremely scalable by allowing a data owner to grant data access privileges based on the attributes of data consumers (eg, age, nationality, sex) rather than an explicit list of user names; And it ensures the privacy of data and the exclusivity of scalable media access by using attribute-based encryption. For this, we introduce a new technique of Encryption of Character Attributes of Multiple Text Encryption (MCP-ABE). MCP-ABE encrypts multiple messages within an encrypted text so that access control based on flexible attributes can be applied to scalable media. Specifically, the schema constructs a key chart that matches the access privileges of the users, encrypts the media units with the corresponding keys, and then encrypts the key chart with MCP-ABE; Only those data consumers with the required user attributes can decrypt the encryption of the key subgraph and then decrypt the encrypted media drives. To power mobile devices with limited resources, the scheme downloads intensive computing operations to cloud servers without compromising the privacy of user data.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: broadcast encryption java source code, international data encryption algorithm source code java, abe lincolns cnallenges, java mini project on image encryption and descryption with source code, coding for attribute based encryption in asp net, cloudsim attribute based encryption netbeans tutorials, image encryption using java source code,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  free download source code of online college magazine 5 17,710 29-06-2018, 10:09 AM
Last Post: Guest
  opengl source code for butterfly 3 3,253 14-05-2018, 08:57 AM
Last Post: Akshatha k
  ice cream parlour management system in vb source code 4 5,279 04-04-2018, 11:58 PM
Last Post: vprk77
  dwt code in java for image 2 6,345 24-03-2018, 10:06 PM
Last Post: Guest
  source code in php for online training and placement cell management 1 6,676 23-03-2018, 09:06 AM
Last Post: ritzi
  free download college website project in html with source code 2 4,617 24-02-2018, 10:46 AM
Last Post: Guest
  source code for hospital management system in jsp 4 1,947 13-01-2018, 10:51 AM
Last Post: dhanabhagya
  source code in c for dna cryptography in computer sc ppt 1 1,522 09-01-2018, 09:59 PM
Last Post: harshavarshinib
  to find whether a number is krishnamurthy number or not using java 1 11,253 01-01-2018, 11:39 AM
Last Post: dhanabhagya
  code for fingerprint based atm and locker system 3 8,960 01-12-2017, 11:22 AM
Last Post: jaseela123d

Forum Jump: