Due to increase of cloud storage in recent years by the consumers there’s a massive popularity computer memory devices in addition as in mobiles by using file syncing and sharing (FSS) services. But tremendous increasing mobile devices have of course raised a replacement challenge for preventing the decoder abuse within the FSS service. During this approach we address the problem by using tracing and revoking traitors by employing a new system model called anomaly detection and that we present a replacement threshold cryptosystem, that executes the partial-order key hierarchy, the same as role hierarchy in Hierarchical RBAC. This can be also called Partially-ordered Hierarchical Encryption (PHE). Our system provides two different security mechanisms which are traitor tracing and revocation to support digital forensics. Our construction is threshold provably secure which may be known by the safety and performance analysis. It consists of distinct characteristics like revoking users, constant-size cipher texts and decryption keys, lower overloads for large-scale systems.
Article Details
Unique Paper ID: 149289
Publication Volume & Issue: Volume 6, Issue 11
Page(s): 520 - 525
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024