Amending Protection and Efficiency in Information Sharing

With the high data sharing options there have been increasing demands and concerns for distributed data security; enforcement of access policies is one of the challenging issues. Cipher text policy attribute-based encryption is becoming a promising cryptographic solution to this issue. It enables data owners to define their own policies over user attributes distributed. The advantage comes with a major drawback which is known as a key escrow problem. This is not suitable for data sharing scenarios where the data owner would like to make their private data only accessible to designated users.

Provided by: International Journal of Computer Science and Information Technologies Topic: Security Date Added: Apr 2012 Format: PDF

Find By Topic