Main Reference PaperCompulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing, Future Generation Computer Systems, 2018 [Java].
  • It introduces a novel black-box traceable Cipher-text-Policy Attribute-Based Encryption (CP-ABE) scheme that is much simpler than the existing white-box traceable schemes. A malicious user who builds a decryption black-box can be tracked and exposed by our scheme. Due to its scalability and relatively high efficiency, the scheme could be practical for fog systems. Furthermore, It points out that, if the adversary can distinguish the tracing cipher-text from the normal cipher-text, he can frustrate tracking by out-putting incorrect decryption results. Thus, the trace-ability must be compulsory, to ensure that the adversary cannot distinguish between the tracing cipher-text and the normal cipher-text. Therefore, it presents a formal definition of compulsory trace-ability with a new security game.

Description
  • It introduces a novel black-box traceable Cipher-text-Policy Attribute-Based Encryption (CP-ABE) scheme that is much simpler than the existing white-box traceable schemes. A malicious user who builds a decryption black-box can be tracked and exposed by our scheme. Due to its scalability and relatively high efficiency, the scheme could be practical for fog systems. Furthermore, It points out that, if the adversary can distinguish the tracing cipher-text from the normal cipher-text, he can frustrate tracking by out-putting incorrect decryption results. Thus, the trace-ability must be compulsory, to ensure that the adversary cannot distinguish between the tracing cipher-text and the normal cipher-text. Therefore, it presents a formal definition of compulsory trace-ability with a new security game.

  • To prove to be secure and compulsory traceable under the generic group model.

Aim & Objectives
  • To prove to be secure and compulsory traceable under the generic group model.

  • It can implement a novel black-box traceable CP-ABE scheme that can prevent the abuse of privilege as a further improvement of this model.

Contribution
  • It can implement a novel black-box traceable CP-ABE scheme that can prevent the abuse of privilege as a further improvement of this model.

  • Java Development Kit 1.8.0, MySQL 5.5.40, Netbeans8.0.1

  • J2SE and Java Pairing-Based Cryptography(JPBE) library.

Software Tools & Technologies
  • Java Development Kit 1.8.0, MySQL 5.5.40, Netbeans8.0.1

  • J2SE and Java Pairing-Based Cryptography(JPBE) library.

  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit