Setup also done with the help of RSA algorithm

Setup Module : This is the first module in which
user first needs to register all their details including username and passwords
. These are first checked whether it is original or not , if it is original the
user have successfully created the identity required . Later they can use the
same id and password to login to their home page , where they access all the
functions provided to them like uploading the files , downloading them and many
more .

-> This setup module gives a certain authority to
the data owners which has to be the main thing under certain policies . There
is a setup module for the third party also in case there is no key escrow
problem .

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

 

2.Encrypt Module : This is the next module in the
Ciphertext Policy attribute based encryption in which the data owners can
upload their files and encrypt them as per the policies . By doing this process
it will very helpful for data owners to secure the data .

-> The encrypt module follows different sets of
algorithm depends upon the usage . In our proposed system we have used RSA
algorithm which asymmetric cryptography technique . This algorithm is proved to
be one of the better versions of the attribute based encryption .  

 

3. Key Generation : This is third module in the Ciphertext
Policy attribute based encryption in which the data owners can generate the
secret keys from the third party in order access those files . The keys are
first matched if they satisfies the attribute then they can access their files
.

->key generation is also done with the help of
RSA algorithm , the generated key from the master key will also be in encrypted
format such that the attackers will take a lot of time to hack the accounts .

4. Decrypt Module : This is the fourth and last
module in the Ciphertext Policy attribute based encryption in which the data
owners download all the files with the help of the key generated . The generated
key will helps the user to decrypt their particular files without causing any
problem to the other files which are on the same access structure .

-> The decryption process generally takes a good
amount of time and hence to save that we providing with a better technique  . The decryption module gives the user the
final result they were looking for .  

x

Hi!
I'm Neil!

Would you like to get a custom essay? How about receiving a customized one?

Check it out