AN Effective PHR Based Secure Data Distribution using KC-ABE in Cloud Environment
Sangeetha. M1, P.Vijaya Karthik2, Sivanesh Kumar. A3

1Sangeetha.M, Research Scholar Information Science and Engineering Sir M Visvesvaraya Institute of Technology, Bangalore India
2P. Vijaya Karthik, Professor Information Science and Engineering Sir M Visvesvaraya Institute of Technology, Bangalore India
3Sivanesh Kumar. A, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences Chennai.
Manuscript received on September 23, 2019. | Revised Manuscript received on October 15, 2019. | Manuscript published on October 30, 2019. | PP: 6477-6481 | Volume-9 Issue-1, October 2019 | Retrieval Number: A2260109119/2019©BEIESP | DOI: 10.35940/ijeat.A2260.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The objective of the research work is focused on cloud computing which is a developing design to give secure change among continuous applications. Secure information sharing is characterized as transmission of at least one documents profitably this procedure is utilized to share data’s, characteristics, records among different clients and associations in secure mode and verifies from outsider clients. Usually it is finished by encryption and unscrambling process over private system. This kind of information sharing is finished by new innovation of key cipher text KC-ABE. It can give secure record transmission by having confined access innovation. This developing procedure has been checked in tolerant individual wellbeing record upkeep. These documents are recorded and recovered safely without access by unapproved clients. KC-ABE encryption framework is material to produce for adaptable and secure sharing of information’s in distributed computing, which will reinforcement persistent wellbeing creating records in increasingly defensive manner. In KC-ABE strategy, the subtleties of patient are put away in KC-ABE server farm. In KC-ABE, Key backer just legitimize the entrance control and can’t issue by the encryption. Along these lines the relating tolerant just reserve the options to get to this KC-ABE innovation. It gives more secure information sharing than other encryption framework. The fundamental utilization of this technique are High key age time and encryption time. It can accomplish less encryption time and key age time to improve productivity of KC-ABE.
Keywords: KC-ABE, key issuer, Public key, cipher text, master key analysis.