Affiliation:
1. Assistant Professor, Department of Computer Science and Engineering, P. S. R Engineering College, Sevalpatti, Sivakasi, Virudhunagar, Tamil Nadu, India
Abstract
The progressions made in the savvy meters have empowered the mechanized procedure of the charging arrangement of purchaser electrical utilization. So as to mechanize the errand of charging frameworks, cloud based charging model has been recommended. This sort of open source model can be effortlessly recognizable and altered by the outsider assailants. Henceforth, information security is the major worry amid information procurement and transmission process. This paper devises the cipher text arrangement–Attribute Based Encryption(CP-ABE) for accomplishing productive and anchored information learning show for the shrewd matrix frameworks. A community oriented key is produced for unscrambling the information for the approved client that upgrades the security of the framework. At first, they got information is protected with the entrance control approaches. The information proprietor who has the synergistic key can get to the touchy information or disaster will be imminent, the trait repudiation show confines the information consent. Thus, we can reluctantly illuminate the key escrow issues with diminished capacity utilization in the cloud information sharing frameworks. Trial examination has demonstrated the productivity of the proposed CP-ABE as far as time taken for key age, encryption and unscrambling process. It delineates that the proposed CP-ABE performed better.
Reference20 articles.
1. Zhitao Guan et al, “Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid”, IEEE internet of things, 2016.
2. J. Bethencourt, A. Sahai, and B.Waters, “Ciphertext-policy attribute-based encryption,” in Proc. IEEE Symp. Secur. Privacy,2007, pp. 321-334.
3. N. Attrapadung and H. Imai, “Conjunctive broadcast and attribute-based encryption,” in Proc. Int. Conf. Pairing-Based Cryptography, 2009, pp. 248-265.
4. B. Waters, “Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization,” in Proc. Public Key Cryptography, 2011, pp. 53-70.
5. M. Green, S. Hohnberger, and B. Waters, “Outsourcing the decryption of ABE ciphertext,” in Proc. USENIX Secur. Symp., 2011, pp. 34.