Enhancing Data Security in Cloud Using Cipher Text-Policy Attribute-Based Encryption (CP-ABE)

Authors

  • R. Kaviarasan, G. M. Gayathri, K. Dinesh Kumar, P. Surya Prathap, S. Ashok Kumar

Keywords:

Cloud-based data exchange, CP-ABE, access control, encryption based on cypher textual content-coverage attributes, redundant residue measurement device, Key management system, symmetric AES, safety.

Abstract

The upward push of cloud-primarly based information garage offerings has captured giant interest from each instructional researchers and enterprise professionals, as a result of their cost-effectiveness and operational performance. As these offerings function over public networks, making sure robust security features is crucial to guard facts integrity and consumer privacy. The get entry to policy is embedded in the cipher textual content itself, ensuring that simplest customers whose attributes satisfy the policy can decrypt the records. Utilizing CP-ABE or Cipher Text-Policy Attribute-Based Encryption, the suggested machine makes sure that the owner of the data cannot be identified when a new report is uploaded. CP-ABE is a popular approach that mixes the strengths of symmetric cryptography with integrates AES algorithm to gain excessive levels of encryption speed and communication cost. The data saved on the cloud stays personal and inaccessible to unauthorized users and the cloud itself. The system consists of a mechanism that lets in the cloud to verify if a statistics person is allowed to download a report without revealing touchy data, such as the user’s identification. By the way of integrating these components, the proposed device targets to provide a speed and efficient solution for cloud-based records control and sharing, addressing both the desires for robust statistics protection and powerful get admission to control. Experimental evaluation demonstrates the efficiency of the proposed approach in enhancing facts safety in cloud environments. The consequences indicates reduction in computational cost,  development in ordinary machine overall performance in comparison to traditional encryption methods.

Downloads

Download data is not yet available.

References

Ahmad, S. A., & Garko, A. B. (2019, December). Hybrid cryptography algorithms in cloud computing: A review. In 2019 15th International conference on electronics, computer and computation (ICECCO) (pp. 1-6). IEEE.

Biswas C., Gupta U. D and Haque M. M. (2019). An Efficient Algorithm for Confidentiality, Integrity and Authentication Using Hybrid Cryptography and Steganography. International Conference on Electrical, Computer and Communication Engineering, pp. 1-5. doi:10.1109/ECACE.2019.8679136.

Chandra S., Bidisha M, Sk. S Alam, Siddhartha B. (2015). Content based double encryption algorithm using symmetric key cryptography. 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015) doi: 10.1016/j.procs.2015.07.420., Procedia Computer Science 57 (2015) 1228 – 1234.

Elminaam D., Kader H, Hadhoud M. (2010). Evaluation of the Performance of Symmetric Encryption Algorithms. International Journal of Network Security, vol.10 issue3, pp. 216–222

Zhou, Z., & Huang, D. (2012, October). Efficient and secure data storage operations for mobile cloud computing. In 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm) (pp. 37-45). IEEE.

Ren, Y. J., Shen, J., Wang, J., Han, J., & Lee, S. Y. (2015). Mutual verifiable provable data auditing in public cloud storage. 網際網路技術學刊, 16(2), 317-323.

Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. Proceedings of the 13th ACM Conference on Computer and Communications Security, 89–98. https://doi.org/10.1145/1180405.1180418

Richa, Singla and Richa, Dutta (2017). ‘Hybrid Algorithm for Cloud Data Security’. International Journal of IT & Knowledge Management (IJITKM), volume10 issue2, pp 18-26

Ruj, S., Stojmenovic, M., & Nayak, A. (2013). Decentralized access control with anonymous authentication of data stored in clouds. IEEE transactions on parallel and distributed systems, 25(2), 384-394.

Stalling, W. (2014). Cryptography and Network Security. Harlow, United Kingdom: Prentice Hall.

Taha A.A, AbdElminaam D.S, Hosny K.M (2017). ‘NHCA: Developing New Hybrid Cryptography Algorithm for Cloud Computing Environment’. International Journal of Advanced Computer Science and Applications volume8 issue 11.

Timothy D. P. and Santra A. K.,(2017), A hybrid cryptography algorithm for cloud computing security," 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), Vellore, 2017, pp. 1-5. doi: 10.1109/ICMDCS.2017.8211728

Khan, N., & Al-Yasiri, A. (2016). Identifying cloud security threats to strengthen cloud computing adoption framework. Procedia Computer Science, 94, 485-490.

Two Way factor Authentication, (n.d), retrieved from https://www.imperva.com/learn/application-security/2fatwo-factor-authentication/

Li, J., Chen, X., Li, M., Li, J., Lee, P. P. C., & Lou, W. (2014). Secure Deduplication with Efficient and Reliable Convergent Key Management. IEEE Transactions on Parallel and Distributed Systems, 25(6),1615–1625.

Marqas, R. B., Almufti. S. M. and Ihsan, R.R. (2020). Comparing symmetric and asymmetric cryptography in message encryption and decryption by using AES and RSA algorithms. Journal of Xi'an University of Architecture & Technology, 12(3), 3110-3116.

Mohan, D. N., Kumar, V. H. and Shashank, N. (2020). Enhancement of cloud computing security with secure data storage using AES. International Journal of Research in Engineering, Science and Management, 3(1), 586–587.

Saeed, Z.R., Ayop, Z., Azma. N. and Baharon. M.R. (2018). improved cloud storage security of using three layers cryptography algorithms. International Journal of Computer Science and Information Security, 16(10),34- 39.

Patil, S., Vhatkar, P., & Gajwani, J. (2014). Towards secure and dependable storage services in cloud computing. Int. J. Innovative Res. Adv. Eng, 1(9), 57-64.

San, M. M. and Win, K. M. (2019). Risk management of secure cloud in higher educational institution. International Journal of Trend in Scientific Research and Development, 3(5), 1314-1319.

Sharma, Y., Gupta, H. and Khatri, S. K. (2019). A security model for the enhancement of data privacy in cloud computing. In: IEEE Amity International Conference on Artificial Intelligence, Dubai, United Arab Emirates, United Arab Emirates, 4-6/02/ 2019. DOI:10.1109/AICAI.2019. 8701398

Singh, B. and Sharma, S. (2019). Enhancing data security using encryption and splitting technique over multicloud environment. International Journal of Scientific Research & Engineering Trends, 5(3),1041-104.

Zhang, F., & Al-Turjman, F. (2023). Blockchain and cloud computing-based secure electronic healthcare records storage and sharing. Applied Soft Computing, 132, 109909.

Venkateswaran, N., Vidhya, K., Ayyannan, M., Chavan, S. M., Sekar, K., & Boopathi, S. (2023). A Study on Smart Energy Management Framework Using Cloud Computing. In 5G, Artificial Intelligence, and Next Generation Internet of Things: Digital Innovation for Green and Sustainable Economies (pp. 189-212). IGI Global.

Sadeeq, M. M., Abdulkareem, N. M., Zeebaree, S. R., Ahmed, D. M., Sami, A. S., & Zebari, R. R. (2021). IoT and Cloud computing issues, challenges and opportunities: A review. Qubahan Academic Journal, 1(2), 1-7.

Logesh, K., & Subramanian, S. (2022). Secure and Efficient Dual Access Control Scheme in Cloud Based Data Storage and File Access with QR Code. Child Studies in Asia-Pacific Contexts, 12(1), 53-63.

Tang, X., Guo, C., Choo, K. K. R., Jiang, X., & Liu, Y. (2024). A secure and lightweight cloud data deduplication scheme with efficient access control and key management. Computer Communications, 222, 209-219.

Downloads

Published

19.12.2024

How to Cite

R. Kaviarasan. (2024). Enhancing Data Security in Cloud Using Cipher Text-Policy Attribute-Based Encryption (CP-ABE). International Journal of Intelligent Systems and Applications in Engineering, 12(4), 5087–5099. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7283

Issue

Section

Research Article