Enhancing Data Security in Cloud Using Cipher Text-Policy Attribute-Based Encryption (CP-ABE)
Keywords:
Cloud-based data exchange, CP-ABE, access control, encryption based on cypher textual content-coverage attributes, redundant residue measurement device, Key management system, symmetric AES, safety.Abstract
The upward push of cloud-primarly based information garage offerings has captured giant interest from each instructional researchers and enterprise professionals, as a result of their cost-effectiveness and operational performance. As these offerings function over public networks, making sure robust security features is crucial to guard facts integrity and consumer privacy. The get entry to policy is embedded in the cipher textual content itself, ensuring that simplest customers whose attributes satisfy the policy can decrypt the records. Utilizing CP-ABE or Cipher Text-Policy Attribute-Based Encryption, the suggested machine makes sure that the owner of the data cannot be identified when a new report is uploaded. CP-ABE is a popular approach that mixes the strengths of symmetric cryptography with integrates AES algorithm to gain excessive levels of encryption speed and communication cost. The data saved on the cloud stays personal and inaccessible to unauthorized users and the cloud itself. The system consists of a mechanism that lets in the cloud to verify if a statistics person is allowed to download a report without revealing touchy data, such as the user’s identification. By the way of integrating these components, the proposed device targets to provide a speed and efficient solution for cloud-based records control and sharing, addressing both the desires for robust statistics protection and powerful get admission to control. Experimental evaluation demonstrates the efficiency of the proposed approach in enhancing facts safety in cloud environments. The consequences indicates reduction in computational cost, development in ordinary machine overall performance in comparison to traditional encryption methods.
Downloads
References
Ahmad, S. A., & Garko, A. B. (2019, December). Hybrid cryptography algorithms in cloud computing: A review. In 2019 15th International conference on electronics, computer and computation (ICECCO) (pp. 1-6). IEEE.
Biswas C., Gupta U. D and Haque M. M. (2019). An Efficient Algorithm for Confidentiality, Integrity and Authentication Using Hybrid Cryptography and Steganography. International Conference on Electrical, Computer and Communication Engineering, pp. 1-5. doi:10.1109/ECACE.2019.8679136.
Chandra S., Bidisha M, Sk. S Alam, Siddhartha B. (2015). Content based double encryption algorithm using symmetric key cryptography. 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015) doi: 10.1016/j.procs.2015.07.420., Procedia Computer Science 57 (2015) 1228 – 1234.
Elminaam D., Kader H, Hadhoud M. (2010). Evaluation of the Performance of Symmetric Encryption Algorithms. International Journal of Network Security, vol.10 issue3, pp. 216–222
Zhou, Z., & Huang, D. (2012, October). Efficient and secure data storage operations for mobile cloud computing. In 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm) (pp. 37-45). IEEE.
Ren, Y. J., Shen, J., Wang, J., Han, J., & Lee, S. Y. (2015). Mutual verifiable provable data auditing in public cloud storage. 網際網路技術學刊, 16(2), 317-323.
Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. Proceedings of the 13th ACM Conference on Computer and Communications Security, 89–98. https://doi.org/10.1145/1180405.1180418
Richa, Singla and Richa, Dutta (2017). ‘Hybrid Algorithm for Cloud Data Security’. International Journal of IT & Knowledge Management (IJITKM), volume10 issue2, pp 18-26
Ruj, S., Stojmenovic, M., & Nayak, A. (2013). Decentralized access control with anonymous authentication of data stored in clouds. IEEE transactions on parallel and distributed systems, 25(2), 384-394.
Stalling, W. (2014). Cryptography and Network Security. Harlow, United Kingdom: Prentice Hall.
Taha A.A, AbdElminaam D.S, Hosny K.M (2017). ‘NHCA: Developing New Hybrid Cryptography Algorithm for Cloud Computing Environment’. International Journal of Advanced Computer Science and Applications volume8 issue 11.
Timothy D. P. and Santra A. K.,(2017), A hybrid cryptography algorithm for cloud computing security," 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), Vellore, 2017, pp. 1-5. doi: 10.1109/ICMDCS.2017.8211728
Khan, N., & Al-Yasiri, A. (2016). Identifying cloud security threats to strengthen cloud computing adoption framework. Procedia Computer Science, 94, 485-490.
Two Way factor Authentication, (n.d), retrieved from https://www.imperva.com/learn/application-security/2fatwo-factor-authentication/
Li, J., Chen, X., Li, M., Li, J., Lee, P. P. C., & Lou, W. (2014). Secure Deduplication with Efficient and Reliable Convergent Key Management. IEEE Transactions on Parallel and Distributed Systems, 25(6),1615–1625.
Marqas, R. B., Almufti. S. M. and Ihsan, R.R. (2020). Comparing symmetric and asymmetric cryptography in message encryption and decryption by using AES and RSA algorithms. Journal of Xi'an University of Architecture & Technology, 12(3), 3110-3116.
Mohan, D. N., Kumar, V. H. and Shashank, N. (2020). Enhancement of cloud computing security with secure data storage using AES. International Journal of Research in Engineering, Science and Management, 3(1), 586–587.
Saeed, Z.R., Ayop, Z., Azma. N. and Baharon. M.R. (2018). improved cloud storage security of using three layers cryptography algorithms. International Journal of Computer Science and Information Security, 16(10),34- 39.
Patil, S., Vhatkar, P., & Gajwani, J. (2014). Towards secure and dependable storage services in cloud computing. Int. J. Innovative Res. Adv. Eng, 1(9), 57-64.
San, M. M. and Win, K. M. (2019). Risk management of secure cloud in higher educational institution. International Journal of Trend in Scientific Research and Development, 3(5), 1314-1319.
Sharma, Y., Gupta, H. and Khatri, S. K. (2019). A security model for the enhancement of data privacy in cloud computing. In: IEEE Amity International Conference on Artificial Intelligence, Dubai, United Arab Emirates, United Arab Emirates, 4-6/02/ 2019. DOI:10.1109/AICAI.2019. 8701398
Singh, B. and Sharma, S. (2019). Enhancing data security using encryption and splitting technique over multicloud environment. International Journal of Scientific Research & Engineering Trends, 5(3),1041-104.
Zhang, F., & Al-Turjman, F. (2023). Blockchain and cloud computing-based secure electronic healthcare records storage and sharing. Applied Soft Computing, 132, 109909.
Venkateswaran, N., Vidhya, K., Ayyannan, M., Chavan, S. M., Sekar, K., & Boopathi, S. (2023). A Study on Smart Energy Management Framework Using Cloud Computing. In 5G, Artificial Intelligence, and Next Generation Internet of Things: Digital Innovation for Green and Sustainable Economies (pp. 189-212). IGI Global.
Sadeeq, M. M., Abdulkareem, N. M., Zeebaree, S. R., Ahmed, D. M., Sami, A. S., & Zebari, R. R. (2021). IoT and Cloud computing issues, challenges and opportunities: A review. Qubahan Academic Journal, 1(2), 1-7.
Logesh, K., & Subramanian, S. (2022). Secure and Efficient Dual Access Control Scheme in Cloud Based Data Storage and File Access with QR Code. Child Studies in Asia-Pacific Contexts, 12(1), 53-63.
Tang, X., Guo, C., Choo, K. K. R., Jiang, X., & Liu, Y. (2024). A secure and lightweight cloud data deduplication scheme with efficient access control and key management. Computer Communications, 222, 209-219.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.


