Deniable Attribute-based Encryption in Audit-free Cloud Environment
S. Rajaparaksh1, S. Muthuslvan2, K. Karthik3, Ravulu Abhimanya4, Ithagani Srikanth5

1Dr. S. Rajaprakash, Dept. of Computer Science and Technology, Aarupadai Veedu Institute of Technology, Vinayaka Missions Research Foundation Chennai, India.
2S. Muthuselvan, Dept. of Computer Science and Technology, Aarupadai Veedu Institute of Technology, Vinayaka Missions Research Foundation Chennai, India.
3K. Karthik, Dept. of Computer Science and Technology, Aarupadai Veedu Institute of Technology, Vinayaka Missions Research Foundation Chennai, India.
Ravulu Abhimanya, Dept. of Computer Science and Technology, Aarupadai Veedu Institute of Technology, Vinayaka Missions Research Foundation Chennai, India.
4Ithagani Srikanth, Dept. of Computer Science and Technology, Aarupadai Veedu Institute of Technology, Vinayaka Missions Research Foundation Chennai, India.

Manuscript received on November 14, 2019. | Revised Manuscript received on 22 November, 2019. | Manuscript published on December 10, 2019. | PP: 4767-4771 | Volume-9 Issue-2, December 2019. | Retrieval Number: B7090129219/2019©BEIESP | DOI: 10.35940/ijitee.B7090.129219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Due to higher need of memory and other special needs, cloud computing has become very popular. Many cloud encryption schemes are introduced to increase the protection of the files stored in the cloud. These encryption schemes are said to be safe and cannot be hacked. But in some case, due to some circumstances, certain authorities may force service providers to reveal the confidential data stored in the cloud. Thus making the cloud computing to lose its trust from the users in this paper, we are introducing our structure of another encryption conspire, which empowers distributed storage suppliers to make persuading counterfeit regarding the information put away in the cloud. Along these lines making the coercers, befuddled to see the acquired insider facts as obvious or not.so this sort of encryption makes the distributed computing progressively reliable. The greater part of the plans still accept that the specialist organizations are sheltered from hacking and can be trusted. Yet, practically speaking, a few elements may capture the correspondence among clients and specialist co-ops, convincing the specialist co-ops to discharge the information by controlling government control or other means.so for this situation, the encryptions are believed to be fizzled and the information which are regarded to be classified or mystery are discharged to these elements. 
Keywords: Attribute base Encryption, Audit free Cloud, Deniable.
Scope of the Article: Environmental Engineering