Accountable specific attribute-based encryption scheme for cloud access control

被引:3
作者
Nayudu, P. Prathap [1 ]
Sekhar, Krovi Raja [1 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Vaddeswaram, Andhra Pradesh, India
关键词
Attribute-based encryption; Accountability; Ciphertext policy; Cloud access control; CP-ABE; SECURE; INTERNET; PRIVACY;
D O I
10.1007/s13198-022-01689-z
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Ciphertext attribute-based encryption is a proven mechanism for providing the privacy and security for the shared resources in the cloud. However, the issues that are concerned with the sharing mechanisms such as master key and access policies were exploited by the malicious users. Moreover, the access control mechanisms are developed by using the large universe of attributes of the shared resource in the cloud. More number of attributes results into increase in computation time while computing the master and secret keys as well as for encryption and decryption processes. The observations over the participating attributes play vital role to prepare a machine learning model in terms of better accountability. In this paper we have proposed specific attribute-based encryption to provide the better security and better cloud access control mechanism. Inclusion of dynamic attributes while performing the encryption at data owner, cloud server would serve a better performance to avoid key exposure. This performance is elevated while generating the secret key at the proxy server. The performance has been found to be satisfactorily encouraging by reducing the computation time to almost half of the existing schemes and the observations are in accordance to the required accountability.
引用
收藏
页数:10
相关论文
共 49 条
[1]   A trustworthy agent-based encrypted access control method for mobile cloud computing environment [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
PERVASIVE AND MOBILE COMPUTING, 2019, 52 :13-28
[2]   A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage [J].
Ahuja, Rohit ;
Mohanty, Sraban Kumar .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (01) :32-44
[3]   A fully distributed hierarchical attribute-based encryption scheme [J].
Ali, Mohammad ;
Mohajeri, Javad ;
Sadeghi, Mohammad-Reza ;
Liu, Ximeng .
THEORETICAL COMPUTER SCIENCE, 2020, 815 :25-46
[4]   Secure and Efficient Cloud-based IoT Authenticated Key Agreement scheme for e-Health Wireless Sensor Networks [J].
Alzahrani, Bander A. .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (04) :3017-3032
[5]  
[Anonymous], 2019, International Journal of Advanced Computer Science and Applications, DOI DOI 10.14569/IJACSA.2019.0100529
[6]  
Balamurugan B., 2014, Journal of Emerging Technologies in Web Intelligence, V6, P263, DOI 10.4304/jetwi.6.3.263-272
[7]   An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption [J].
Balu, A. ;
Kuppusamy, K. .
INFORMATION SCIENCES, 2014, 276 :354-362
[8]   PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT [J].
Belguith, Sana ;
Kaaniche, Nesrine ;
Laurent, Maryline ;
Jemai, Abderrazak ;
Attia, Rabah .
COMPUTER NETWORKS, 2018, 133 :141-156
[9]  
Benamara MA., 2015, INT J SECUR NETWORKS, V10, P183, DOI [10.1504/IJSN.2015.071833, DOI 10.1504/IJSN.2015.071833]
[10]   Parallel search over encrypted data under attribute based encryption on the Cloud Computing [J].
Bouabana-Tebibel, Thouraya ;
Kaci, Abdellah .
COMPUTERS & SECURITY, 2015, 54 :77-91