Setup Module : This is the first module in whichuser first needs to register all their details including username and passwords. These are first checked whether it is original or not , if it is original theuser have successfully created the identity required . Later they can use thesame id and password to login to their home page , where they access all thefunctions provided to them like uploading the files , downloading them and manymore .-> This setup module gives a certain authority tothe data owners which has to be the main thing under certain policies .
Thereis a setup module for the third party also in case there is no key escrowproblem . 2.Encrypt Module : This is the next module in theCiphertext Policy attribute based encryption in which the data owners canupload their files and encrypt them as per the policies . By doing this processit will very helpful for data owners to secure the data .
-> The encrypt module follows different sets ofalgorithm depends upon the usage . In our proposed system we have used RSAalgorithm which asymmetric cryptography technique . This algorithm is proved tobe one of the better versions of the attribute based encryption . 3.
Key Generation : This is third module in the CiphertextPolicy attribute based encryption in which the data owners can generate thesecret keys from the third party in order access those files . The keys arefirst matched if they satisfies the attribute then they can access their files.->key generation is also done with the help ofRSA algorithm , the generated key from the master key will also be in encryptedformat such that the attackers will take a lot of time to hack the accounts . 4.
Decrypt Module : This is the fourth and lastmodule in the Ciphertext Policy attribute based encryption in which the dataowners download all the files with the help of the key generated . The generatedkey will helps the user to decrypt their particular files without causing anyproblem to the other files which are on the same access structure . -> The decryption process generally takes a goodamount of time and hence to save that we providing with a better technique . The decryption module gives the user thefinal result they were looking for .