Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search

被引:0
|
作者
Saraswathy, K. S. [1 ]
Sujatha, S. S. [2 ]
机构
[1] Manonmaniam Sundaranar Univ, Dept Comp Sci, Abishekapatti 627012, Tirunelveli, India
[2] Manonmaniam Sundarnar Univ, ST Hindu Coll, Abishekapatti 627012, Tirunelveli, India
关键词
Cloud computing; data access control; Nth Truncated Ring Units; Ciphertext Policy Attribute-Based Encryption; database authentication; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security and privacy issues regarding outsourcing data have risen significantly as cloud computing has grown in demand. Consequently, since data management has been delegated to an untrusted cloud server in the data outsourcing phase, data access control has been identified as a major problem in cloud storage systems. To overcome this problem, in this paper, the access control of cloud storage using an Attribute-Based Access Control (ABAC) approach is utilized. First, the data must be stored in the cloud and security must be strong for the user to access the data. This model takes into consideration some of the attributes of the cloud data stored in the authentication process that the database uses to maintain data around the recorded collections with the user's saved keys. The clusters have registry message permission codes, usernames, and group names, each with its own set of benefits. In advance, the data should be encrypted and transferred to the service provider as it establishes that the data is still secure. But in some cases, the supplier's security measures are disrupting. This result analysis the various parameters such as encryption time, decryption time, key generation time, and also time consumption. In cloud storage, the access control may verify the various existing method such as Ciphertext Policy Attribute-Based Encryption (CP-ABE) and Nth Truncated Ring Units (NTRU). The encryption time is 15% decreased by NTRU and 31% reduced by CP-ABE. The decryption time of the proposed method is 7.64% and 14% reduced by the existing method.
引用
收藏
页码:569 / 575
页数:7
相关论文
共 50 条
  • [21] Hierarchical Attribute-based Access Control with Authentication for Outsourced Data in Cloud Computing
    Liu, Xuejiao
    Xia, Yingjie
    Jiang, Shasha
    Xia, Fubiao
    Wang, Yanbo
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 477 - 484
  • [22] Efficient Attribute-based Data Access in Astronomy Analysis
    Ma, B.
    Shoshani, A.
    Sim, A.
    Wu, K.
    Byun, Y.
    Hahm, J.
    Shin, M. -S.
    2012 SC COMPANION: HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SCC), 2012, : 562 - 571
  • [23] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2015, 48 (02) : 85 - 88
  • [24] Attribute-Based Data and Privilege Hybrid Access Control Scheme in Cloud Computing
    Liu, Qin
    Li, Pengju
    Yu, Chunwu
    Computer Engineering and Applications, 2024, 60 (13) : 276 - 286
  • [25] A survey of attribute-based access control with user revocation in cloud data storage
    Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [26] Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption
    Yang, Xiaodong
    Chen, Aijia
    Wang, Zhisong
    Li, Shudong
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [27] An Attribute-based Access Control Scheme in Cloud Storage Environment
    Xing, M. H.
    Li, W. M.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION TECHNOLOGY (SEIT2015), 2016, : 129 - 134
  • [28] Dynamic Attribute-Based Access Control in Cloud Storage Systems
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    Zhang, Chunkai
    Zhao, Xiaomeng
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 129 - 137
  • [29] Attribute-based bilateral access control scheme for cloud storage
    Li Q.
    Fan H.
    Chen W.
    Xiong J.
    Han L.
    Li R.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (04): : 128 - 136
  • [30] Attribute-Based Access Control for Vehicular Edge Cloud Computing
    Cheng, Cheng-Yu
    Liu, Hang
    Hsieh, Li-Tse
    Colbert, Edward
    Cho, Jin-Hee
    2020 IEEE CLOUD SUMMIT, 2020, : 18 - 24