Question:
The goals of the project are: 1)learning existing ABE schemes (focusing on Ciphertext- Policy ABE (CP-ABE)) to know how they can be used in cloud applications to protect data security and privacy
2) comparing ABE with public-key encryption (PKE) mechanisms, analysing their differences (the advantages and disadvantages of each), and
3) implementing a concrete ABE scheme to summarize the computation
To do: Explain about Literature Review
1.Bsw 07
2.waters 11
3.fame 17
Comparing them research about them what’s difference than another Advantages and Disadvantages Comparing how they do cpe-abe implementation apart handling access control attribute computation time describe or predict why one to be faster than another
Read less