Cloud Based Internet Of Transportation Of System By Using Artificial Intelligence

Authors

  • Gogulamanda Rohith PG scholar, Department of MCA, DNR College, Bhimavaram, Andhra Pradesh Author
  • V.Sarala (Assistant Professor), Master of Computer Applications, DNR college, Bhimavaram, Andhra Pradesh. Author

Abstract

In today’s digital world, safeguarding
sensitive information from unauthorized access is a
major concern, especially during file sharing over the
internet. This project introduces a Secure File Sharing
System using Ciphertext-Policy Attribute-Based
Encryption (CP-ABE), implemented with Python and
Django. The system ensures confidentiality and
controlled access to uploaded files by integrating CPABE,
which encrypts files using a public key before
uploading them to a cloud server and decrypts them
only with the correct private key. The application
provides role-based authentication for both users and
administrators (AVs) and allows users to register, log
in, upload, view, and download encrypted files. During
the upload process, files are encrypted with a generated
CP-ABE public key, and only the correct private key
can decrypt the content on download. The encryption
key is embedded securely in the database and only
partial keys are shown to ensure additional privacy. All
files are stored securely on the cloud server in
encrypted form. The administrator (AV) can access the
uploaded files and monitor the user activities. This
approach not only ensures file privacy but also enables
controlled and traceable sharing of files. The project
utilizes the ECIES (Elliptic Curve Integrated
Encryption Scheme) library for key generation,
encryption, and decryption, and stores user and file
metadata in a MySQL database. This system can be
effectively used in environments where sensitive file
sharing and access control are essential, such as in
government organizations, healthcare, or educational
institutions.

Downloads

Download data is not yet available.

References

Sahai, A., & Waters, B. (2005). Fuzzy Identity-Based

Encryption. In Advances in Cryptology —

EUROCRYPT 2005 (pp. 457–473). Springer Berlin

Heidelberg.

2. Bethencourt, J., Sahai, A., & Waters, B. (2007).

Ciphertext-Policy Attribute-Based Encryption. In

Proceedings of the IEEE Symposium on Security and

Privacy (pp. 321–334). IEEE.

3. Mihir Bellare, Shai Halevi, and Tal Rabin (2004).

Secure File Sharing with Cryptography. ACM

Computing Surveys, 36(3), 341–387.

4. Wang, C., Li, H., Ren, K., & Lou, W. (2011).

Attribute-Based Encryption for Secure Data Sharing

in Cloud Computing. In Proceedings of the 5th

International Conference on Cloud Computing (pp.

498–505). Springer.

5. Goyal, V., Pandey, O., Sahai, A., & Waters, B.

(2006). Attribute-Based Encryption for Fine-Grained

Access Control of Encrypted Data. In Proceedings of

the 13th ACM Conference on Computer and

Communications Security (CCS 2006).

6. Kuo, M. L., & Lin, C. (2013). AES-based Encryption

Scheme for Secure Data Storage and File Sharing.

International Journal of Computer Science and

Information Security (IJCSIS), 11(8), 63–70.

7. Juels, A., & Brainard, J. (2007). Client-Side

Encryption for Web Services. In Proceedings of the

4th ACM Workshop on Digital Rights Management

(pp. 1-14). ACM.

Downloads

Published

2025-05-01

Issue

Section

Articles

How to Cite

Cloud Based Internet Of Transportation Of System By Using Artificial Intelligence. (2025). International Journal of Multidisciplinary Engineering In Current Research, 10(5), 22-26. https://ijmec.com/index.php/multidisciplinary/article/view/612

Most read articles by the same author(s)