Setup also done with the help of RSA algorithm

Setup Module : This is the first module in whichuser first needs to register all their details including username and passwords. These are first checked whether it is original or not , if it is original theuser have successfully created the identity required . Later they can use thesame id and password to login to their home page , where they access all thefunctions provided to them like uploading the files , downloading them and manymore .-> This setup module gives a certain authority tothe data owners which has to be the main thing under certain policies .

Thereis a setup module for the third party also in case there is no key escrowproblem . 2.Encrypt Module : This is the next module in theCiphertext Policy attribute based encryption in which the data owners canupload their files and encrypt them as per the policies . By doing this processit will very helpful for data owners to secure the data .

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

-> The encrypt module follows different sets ofalgorithm depends upon the usage . In our proposed system we have used RSAalgorithm which asymmetric cryptography technique . This algorithm is proved tobe one of the better versions of the attribute based encryption .   3.

Key Generation : This is third module in the CiphertextPolicy attribute based encryption in which the data owners can generate thesecret keys from the third party in order access those files . The keys arefirst matched if they satisfies the attribute then they can access their files.->key generation is also done with the help ofRSA algorithm , the generated key from the master key will also be in encryptedformat such that the attackers will take a lot of time to hack the accounts . 4.

Decrypt Module : This is the fourth and lastmodule in the Ciphertext Policy attribute based encryption in which the dataowners download all the files with the help of the key generated . The generatedkey will helps the user to decrypt their particular files without causing anyproblem to the other files which are on the same access structure . -> The decryption process generally takes a goodamount of time and hence to save that we providing with a better technique  . The decryption module gives the user thefinal result they were looking for .