tailieunhanh - Embedded digital signature based data sharing scheme in cloud computing

In this encryption technique, Users’ private keys and cipher texts are associated with a set of attributes. This technique completely encrypts the file and does not have any control over the individual attributes in the file. So, in order to overcome this problem a concept called attribute with weight was introduced, so that it can have control over the individual elements in the file and can be able to hide sensitive information while sharing data with the users | ISSN:2249-5789 Mohammed Asma et al, International Journal of Computer Science & Communication Networks,Vol 7(5),133-137 Embedded Digital Signature Based Data Sharing Scheme in Cloud Computing Mohamme d As ma Dr. P. Kiran Sree . M. Tech, Department of CSE, Shri Vishnu Engineering College for Women (A), Vishnupur, Bhimavaram, West Godavari District, Andhra Pradesh. Professor Department of CSE Shri Vishnu Engineering College for Women (A), Vishnupur, Bhimavaram, West Godavari District, Andhra Pradesh. Abstract One of the most promising encryption techniques for secure data sharing in the field of Cloud Computing is Ciphertext-Policy AttributeBased Encryption (CP-ABE).This encryption technique has turned to be an important encryption technology to tackle the challenge of secure data sharing. In this encryption technique, Users’ private keys and cipher texts are associated with a set of attributes. This technique completely encrypts the file and does not have any control over the individual attributes in the file. So, in order to overcome this problem a concept called attribute with weight was introduced, so that it can have control over the individual elements in the file and can be able to hide sensitive information while sharing data with the users. But the problem of malicious cloud insider still persists. Imagine the context of a online health records system. An authorized user can access the health record by satisfying their arbitrary constraints defined by the data owner. Once they get access to the data, the system cannot prohibit or monitor their valid usage of the data. So we design an Embeddable Digital Signature algorithm that can embed the accessing users credentials in each health record they access which has a stealth effect of catching and prosecute them in case of an unauthorized data breach. Hence, the resulting scheme becomes more secure. IJCSCN | October-November 2017 Available online@ Keywords-- Cloud Computing, Data .