Hybrid Cipher-Text Key Policy Attribute-Based Encryption (HCKP-ABE): The Performance Analysis and Scalability in Virtual Machines

Authors

  • Avuthu Siva Swaroopa Rani Koneru Lakshamaiah Education Foundation, Guntur, India 522502
  • Kondepati Rohini Koneru Lakshamaiah Education Foundation, Guntur, India 522502
  • Kilarapu Pavani Koneru Lakshamaiah Education Foundation, Guntur, India 522502
  • Jangala Rani Sai Sree Koneru Lakshamaiah Education Foundation, Guntur, India 522502
  • T. Pavan Kumar Koneru Lakshamaiah Education Foundation, Guntur, India 522502
  • Pachipala Yellamma Koneru Lakshamaiah Education Foundation, Guntur, India 522502

Keywords:

Cloud, Cryptography, Decryption, HCKP Attribute-based Encryption, KP attribute-based Encryption, RSA

Abstract

Attribute-based encryption (ABE) has appeared as a promising advanced cryptographic approach that has emerged is a viable option for secure sharing of data. ABE is particularly useful in scenarios where access to the data should be limited to authorized users depending on their attributes. AB encryption, such as Ciphertext Policy, enables data owners to specify fine-grained access control policies for encryption, based on user attributes. This assures that only people with the necessary credentials may decode and access the encrypted data, providing an additional layer of security. Key Policy ensures secure data access by attaching rules to encrypted information, enabling decryption only for users with matching characteristics. However, in most previous schemes, the execution time for Cipher-Text Key policy Attribute-Based Encryption has been a significant challenge. To overcome this issue, the proposed works have implemented an effective encryption and decryption process. In this paper provide extensive research of the intricacies of the implementation process, evaluating the performance of the developed Hybrid Cipher-Text Key policy Attribute-Based Encryption (HCKP-ABE) system and presenting a comparative analysis of existing schemes. Hybrid Cipher-Text Key policy Attribute-Based Encryption offers significant performance advantages over existing schemes such as KP-ABE RSA & AES. Our performance evaluation revealed that the execution time increases with the number of users and attributes. The results show HCKP-ABE has the smallest key size (512 bits) and the fastest execution time (0.0189 seconds). KP-ABE has a key size (512 bits) and a longer execution time (0.0483 seconds). RSA & AES has the largest key size (2048 bits) and the slowest execution time (0.0295 seconds). HCKP-ABE's pairing-based cryptography enables efficient attribute-based encryption and decryption, and it is a suitable choice for scenarios requiring fine-grained access control and secure data sharing, particularly when the number of users is relatively small compared to the number of attributes.

Downloads

Download data is not yet available.

References

Y. Yu, J. Shi, H. Li, Y. Li, X. Du and M. Guizani, “Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments”, IEEE Journal on Selected Areas in Communications, vol. 38, no. 6, pp. 1242-1251, June 2020.

L. Zhang, G. Hu, Y. Mu and F. Rezaeibagha, “Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System”, IEEE Access, vol. 7, pp. 33202-33213, 2019.

L. Zhang, Y. Cui and Y. Mu, “Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing”, IEEE Systems Journal, vol. 14, no. 1, pp. 387-397, March 2020.

C. Ge, W. Susilo, J. Baek, Z. Liu, J. Xia and L. Fang, “Revocable Attribute-Based Encryption With Data Integrity in Clouds”, IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 5, pp. 2864-2872, 1 Sept.-Oct. 2022.

A. Chiquito, U. Bodin and O. Schelén, "Attribute-Based Approaches for Secure Data Sharing in Industrial Contexts”, IEEE Access, vol. 11, pp. 10180-10195, 2023.

Karimunnisa, S., Pachipala, Y. “Task Classification and Scheduling Using Enhanced Coot Optimization in Cloud Computing”, In: (2023) International Journal of Intelligent Engineering and Systems, 16 (5), pp. 501-511.

R. Imam, Q. M. Areeb, A. Alturki and F. Anwer, “Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status”, IEEE Access, vol. 9, pp. 155949-155976, 2021.

K. Pavani, J. R. S. Sree, A. S. S. Rani, K. Rohini, T. P. Kumar and P. Yellamma, “Data Security and Privacy Issues in Cloud Environment”, In: 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 2023, pp. 788-793.

J. Fu and N. Wang, “A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing”, IEEE Access, vol. 7, pp. 36218-36232, 2019.

H. Li, K. Yu, B. Liu, C. Feng, Z. Qin and G. Srivastava, “An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things”, IEEE Journal of Biomedical and Health Informatics, vol. 26, no. 5, pp. 1949-1960, May 2022.

H. Yin et al., “CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme”, IEEE Access, vol. 7, pp. 5682-5694, 2019.

K. Edemacu, H. K. Park, B. Jang and J. W. Kim, “Privacy Provision in Collaborative Ehealth With Attribute-Based Encryption: Survey, Challenges and Future Directions”, IEEE Access, vol. 7, pp. 89614-89636, 2019.

Z. Liu, J. Xu, Y. Liu and B. Wang, “Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability”, IEEE Access, vol. 7, pp. 66832-66844, 2019.

H. Xiong, H. Zhang and J. Sun, “Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing”, IEEE Systems Journal, vol. 13, no. 3, pp. 2739-2750, Sept. 2019.

J. Sun, L. Ren, S. Wang and X. Yao, “Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage”, in IEEE Access, vol. 7, pp. 66655-66667, 2019.

R. Ahuja and S. K. Mohanty, “A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage”, IEEE Transactions on Cloud Computing, vol. 8, no. 1, pp. 32-44, 1 Jan.-March 2020.

M. Ali, M. -R. Sadeghi and X. Liu, “Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things”, IEEE Access, vol. 8, pp. 23951-23964, 2020.

M. Morales-Sandoval, M. H. Cabello, H. M. Marin-Castro and J. L. G. Compean, “Attribute-Based Encryption Approach for Storage, Sharing and Retrieval of Encrypted Data in the Cloud”, IEEE Access, vol. 8, pp. 170101-170116, 2020.

D. Tiwari, A. Singh, A. Prabhakar, “Performance Analysis of AES, RSA and Hashing Algorithm Using Web Technology”, Computing Algorithms with Applications in Engineering, Vol 18, pp 413, 2020.

M. Rasori, P. Perazzo, G. Dini and S. Yu, “Indirect Revocable KP-ABE With Revocation Undoing Resistance”, IEEE Transactions on Services Computing, vol. 15, no. 5, pp. 2854-2868, 1 Sept.-Oct. 2022.

A. Altigani, S. Hasan, B. Barry, S. Naserelden, M. A. Elsadig and H. T. Elshoush, “A Polymorphic Advanced Encryption Standard – A Novel Approach”, IEEE Access, vol. 9, pp. 20191-20207, 2021.

M. R. Khan et al., “Analysis of Elliptic Curve Cryptography & RSA”, Journal of ICT Standardization, vol. 11, no. 4, pp. 355-378, November 2023.

I. Mustafa et al., “A Lightweight Post-Quantum Lattice-Based RSA for Secure Communications”, IEEE Access, vol. 8, pp. 99273-99285, 2020.

B. Hong, J. Chen, K. Zhang and H. Qian, “Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall”, IEEE Access, vol. 7, pp. 159002-159012, 2019.

Z. Li, W. Li, Z. Jin, H. Zhang and Q. Wen, “An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption”, IEEE Access, vol. 7, pp. 29023-29037, 2019.

N. Chen, J. Li, Y. Zhang and Y. Guo, “Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage”, IEEE Transactions on Computers, vol. 71, no. 1, pp. 175-184, 1 Jan, 2022.

S. Das and S. Namasudra, “Multiauthority CP-ABE-based Access Control Model for IoT-enabled Healthcare Infrastructure”, IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 821-829, Jan, 2023

Y. Zhang, J. Li and H. Yan, “Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure”, IEEE Access, vol. 7, pp. 47982-47990, 2019

Downloads

Published

24.03.2024

How to Cite

Rani, A. S. S. ., Rohini, K. ., Pavani, K. ., Sree, J. R. S. ., Kumar, T. P. ., & Yellamma, P. . (2024). Hybrid Cipher-Text Key Policy Attribute-Based Encryption (HCKP-ABE): The Performance Analysis and Scalability in Virtual Machines. International Journal of Intelligent Systems and Applications in Engineering, 12(19s), 460–470. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5085

Issue

Section

Research Article