Follow us on Facebook

Header Ads

Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme



Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme

ABSTRACT:
In a decentralized attribute-based encryption (ABE) system, any party can act as an authority by creating a public key and issuing private keys to different users that reflect their attributes without any collaboration. Such an ABE scheme can eliminate the burden of heavy communication and collaborative computation in the setup phase of multi-authority ABE schemes, thus is considered more preferable. Recently in IEEE Trans. Parallel Distrib. Syst., Han et al. [3] proposed an interesting privacy-preserving decentralized key-policy ABE scheme, which was claimed to achieve better privacy for users and to be provably secure in the standard model. However, after carefully revisiting the scheme, we conclude that their scheme cannot resist the collusion attacks, hence fails to meet the basic security definitions of the ABE system.
EXISTING SYSTEM:
As attribute-based encryption (ABE) can simultaneously provide flexible access control and data confidentiality functionalities, it has become a promising technique for building secure access in practical distributed systems. Very recently, Han et al. proposed a decentralized key-policy ABE scheme in the standard model, based on which, they proposed a privacy preserving key extraction protocol to protect the user’s identifier. They also claimed that they solved the challenging open problem left by Chase and Chow by constructing a privacy preserving multi-authority ABE scheme without interactions among the authorities
DISADVANTAGES OF EXISTING SYSTEM:
However, after carefully analyzing the existing scheme, we found that this scheme is vulnerable to the collusion attack, which is a basic security requirements for ABEs systems.
PROPOSED SYSTEM:
Recently in IEEE Trans. Parallel Distrib. Syst., Han et al. [3] proposed an interesting privacy-preserving decentralized key-policy ABE scheme, which was claimed to achieve better privacy for users and to be provably secure in the standard model. However, after carefully revisiting the scheme, we conclude that their scheme cannot resist the collusion attacks, hence fails to meet the basic security definitions of the ABE system.
We propose a new system that can resist collusion attacks.
ADVANTAGES OF PROPOSED SYSTEM:
Overcome the drawback of collusion attacks which is in existing system.

SYSTEM CONFIGURATION:-

HARDWARE CONFIGURATION:-


ü Processor             -        Pentium –IV

ü Speed                             -        1.1 Ghz
ü RAM                    -        256 MB(min)
ü Hard Disk            -        20 GB
ü Key Board            -        Standard Windows Keyboard
ü Mouse                  -        Two or Three Button Mouse
ü Monitor                -        SVGA

 

SOFTWARE CONFIGURATION:-


ü Operating System                    : Windows XP
ü Programming Language           : JAVA
ü Java Version                           : JDK 1.6 & above.
REFERENCE:
Aijun Ge, Jiang Zhang, Rui Zhang, Chuangui Ma, and Zhenfeng Zhang, “Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013.