Hybrid Cipher-Text Key Policy Attribute-Based Encryption (HCKP-ABE): The Performance Analysis and Scalability in Virtual Machines
Keywords:
Cloud, Cryptography, Decryption, HCKP Attribute-based Encryption, KP attribute-based Encryption, RSAAbstract
Attribute-based encryption (ABE) has appeared as a promising advanced cryptographic approach that has emerged is a viable option for secure sharing of data. ABE is particularly useful in scenarios where access to the data should be limited to authorized users depending on their attributes. AB encryption, such as Ciphertext Policy, enables data owners to specify fine-grained access control policies for encryption, based on user attributes. This assures that only people with the necessary credentials may decode and access the encrypted data, providing an additional layer of security. Key Policy ensures secure data access by attaching rules to encrypted information, enabling decryption only for users with matching characteristics. However, in most previous schemes, the execution time for Cipher-Text Key policy Attribute-Based Encryption has been a significant challenge. To overcome this issue, the proposed works have implemented an effective encryption and decryption process. In this paper provide extensive research of the intricacies of the implementation process, evaluating the performance of the developed Hybrid Cipher-Text Key policy Attribute-Based Encryption (HCKP-ABE) system and presenting a comparative analysis of existing schemes. Hybrid Cipher-Text Key policy Attribute-Based Encryption offers significant performance advantages over existing schemes such as KP-ABE RSA & AES. Our performance evaluation revealed that the execution time increases with the number of users and attributes. The results show HCKP-ABE has the smallest key size (512 bits) and the fastest execution time (0.0189 seconds). KP-ABE has a key size (512 bits) and a longer execution time (0.0483 seconds). RSA & AES has the largest key size (2048 bits) and the slowest execution time (0.0295 seconds). HCKP-ABE's pairing-based cryptography enables efficient attribute-based encryption and decryption, and it is a suitable choice for scenarios requiring fine-grained access control and secure data sharing, particularly when the number of users is relatively small compared to the number of attributes.
Downloads
References
Y. Yu, J. Shi, H. Li, Y. Li, X. Du and M. Guizani, “Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments”, IEEE Journal on Selected Areas in Communications, vol. 38, no. 6, pp. 1242-1251, June 2020.
L. Zhang, G. Hu, Y. Mu and F. Rezaeibagha, “Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System”, IEEE Access, vol. 7, pp. 33202-33213, 2019.
L. Zhang, Y. Cui and Y. Mu, “Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing”, IEEE Systems Journal, vol. 14, no. 1, pp. 387-397, March 2020.
C. Ge, W. Susilo, J. Baek, Z. Liu, J. Xia and L. Fang, “Revocable Attribute-Based Encryption With Data Integrity in Clouds”, IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 5, pp. 2864-2872, 1 Sept.-Oct. 2022.
A. Chiquito, U. Bodin and O. Schelén, "Attribute-Based Approaches for Secure Data Sharing in Industrial Contexts”, IEEE Access, vol. 11, pp. 10180-10195, 2023.
Karimunnisa, S., Pachipala, Y. “Task Classification and Scheduling Using Enhanced Coot Optimization in Cloud Computing”, In: (2023) International Journal of Intelligent Engineering and Systems, 16 (5), pp. 501-511.
R. Imam, Q. M. Areeb, A. Alturki and F. Anwer, “Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status”, IEEE Access, vol. 9, pp. 155949-155976, 2021.
K. Pavani, J. R. S. Sree, A. S. S. Rani, K. Rohini, T. P. Kumar and P. Yellamma, “Data Security and Privacy Issues in Cloud Environment”, In: 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 2023, pp. 788-793.
J. Fu and N. Wang, “A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing”, IEEE Access, vol. 7, pp. 36218-36232, 2019.
H. Li, K. Yu, B. Liu, C. Feng, Z. Qin and G. Srivastava, “An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things”, IEEE Journal of Biomedical and Health Informatics, vol. 26, no. 5, pp. 1949-1960, May 2022.
H. Yin et al., “CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme”, IEEE Access, vol. 7, pp. 5682-5694, 2019.
K. Edemacu, H. K. Park, B. Jang and J. W. Kim, “Privacy Provision in Collaborative Ehealth With Attribute-Based Encryption: Survey, Challenges and Future Directions”, IEEE Access, vol. 7, pp. 89614-89636, 2019.
Z. Liu, J. Xu, Y. Liu and B. Wang, “Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability”, IEEE Access, vol. 7, pp. 66832-66844, 2019.
H. Xiong, H. Zhang and J. Sun, “Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing”, IEEE Systems Journal, vol. 13, no. 3, pp. 2739-2750, Sept. 2019.
J. Sun, L. Ren, S. Wang and X. Yao, “Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage”, in IEEE Access, vol. 7, pp. 66655-66667, 2019.
R. Ahuja and S. K. Mohanty, “A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage”, IEEE Transactions on Cloud Computing, vol. 8, no. 1, pp. 32-44, 1 Jan.-March 2020.
M. Ali, M. -R. Sadeghi and X. Liu, “Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things”, IEEE Access, vol. 8, pp. 23951-23964, 2020.
M. Morales-Sandoval, M. H. Cabello, H. M. Marin-Castro and J. L. G. Compean, “Attribute-Based Encryption Approach for Storage, Sharing and Retrieval of Encrypted Data in the Cloud”, IEEE Access, vol. 8, pp. 170101-170116, 2020.
D. Tiwari, A. Singh, A. Prabhakar, “Performance Analysis of AES, RSA and Hashing Algorithm Using Web Technology”, Computing Algorithms with Applications in Engineering, Vol 18, pp 413, 2020.
M. Rasori, P. Perazzo, G. Dini and S. Yu, “Indirect Revocable KP-ABE With Revocation Undoing Resistance”, IEEE Transactions on Services Computing, vol. 15, no. 5, pp. 2854-2868, 1 Sept.-Oct. 2022.
A. Altigani, S. Hasan, B. Barry, S. Naserelden, M. A. Elsadig and H. T. Elshoush, “A Polymorphic Advanced Encryption Standard – A Novel Approach”, IEEE Access, vol. 9, pp. 20191-20207, 2021.
M. R. Khan et al., “Analysis of Elliptic Curve Cryptography & RSA”, Journal of ICT Standardization, vol. 11, no. 4, pp. 355-378, November 2023.
I. Mustafa et al., “A Lightweight Post-Quantum Lattice-Based RSA for Secure Communications”, IEEE Access, vol. 8, pp. 99273-99285, 2020.
B. Hong, J. Chen, K. Zhang and H. Qian, “Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall”, IEEE Access, vol. 7, pp. 159002-159012, 2019.
Z. Li, W. Li, Z. Jin, H. Zhang and Q. Wen, “An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption”, IEEE Access, vol. 7, pp. 29023-29037, 2019.
N. Chen, J. Li, Y. Zhang and Y. Guo, “Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage”, IEEE Transactions on Computers, vol. 71, no. 1, pp. 175-184, 1 Jan, 2022.
S. Das and S. Namasudra, “Multiauthority CP-ABE-based Access Control Model for IoT-enabled Healthcare Infrastructure”, IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 821-829, Jan, 2023
Y. Zhang, J. Li and H. Yan, “Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure”, IEEE Access, vol. 7, pp. 47982-47990, 2019
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.