An Efficient Data Integrity using Attribute Based Encryption for Cloud Computing System
K.S.S.Trinadh Samudrala1, Potluri Sindhu Phani Sree2, Chennupati Karthik3, Divya Vadlamudi4

1K.S.S.Trinadh Samudrala*, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh.
2Potluri Sindhu Phani Sree, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation ,Vaddeswaram, Guntur, Andhra Pradesh.
3Chennupati Karthik, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh.
4Divya Vadlamudi, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh

Manuscript received on November 15, 2019. | Revised Manuscript received on 20 November, 2019. | Manuscript published on December 10, 2019. | PP: 2186-2190 | Volume-9 Issue-2, December 2019. | Retrieval Number: B7518129219/2019©BEIESP | DOI: 10.35940/ijitee.B7518.129219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The new and efficient method determinedly concentrates on the data processing, store and access the information which will be intended to make sure the users for legal powers should get equivalent information and also will confine the normal and unofficial legal users get admittance of the information which make suitable for those mobile cloud computing. There are various parameters with assess those execution of the active Attribute-Based encryption (ABE) method over cloud computing as takes after: cipher text measure (communication cost), private key span (storage cost), public key size (“Required storage on store public key in about powers in the ABE method”), re-keying extent (the size of the rekeying message that could make used to identify the user revocation for every attributes in the ABE system), calculation expense on the information manager (required time to encrypt the information by owner), calculation cost on the user (required run time to decrypt the information by a user). Our research work effort likewise analyses the vitality of the information security in the cloud. Purpose behind picking symmetric encryption algorithms are proficient to handle encryption and decryption to substantial measure about information and powerful speed about storing information and gaining access to those information in the cloud system. 
Keywords: Attribute-based Encryption, , Cloud Computing System, Hybrid Cryptography, Security
Scope of the Article: Cloud Computing