Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search

被引:0
|
作者
Saraswathy, K. S. [1 ]
Sujatha, S. S. [2 ]
机构
[1] Manonmaniam Sundaranar Univ, Dept Comp Sci, Abishekapatti 627012, Tirunelveli, India
[2] Manonmaniam Sundarnar Univ, ST Hindu Coll, Abishekapatti 627012, Tirunelveli, India
关键词
Cloud computing; data access control; Nth Truncated Ring Units; Ciphertext Policy Attribute-Based Encryption; database authentication; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security and privacy issues regarding outsourcing data have risen significantly as cloud computing has grown in demand. Consequently, since data management has been delegated to an untrusted cloud server in the data outsourcing phase, data access control has been identified as a major problem in cloud storage systems. To overcome this problem, in this paper, the access control of cloud storage using an Attribute-Based Access Control (ABAC) approach is utilized. First, the data must be stored in the cloud and security must be strong for the user to access the data. This model takes into consideration some of the attributes of the cloud data stored in the authentication process that the database uses to maintain data around the recorded collections with the user's saved keys. The clusters have registry message permission codes, usernames, and group names, each with its own set of benefits. In advance, the data should be encrypted and transferred to the service provider as it establishes that the data is still secure. But in some cases, the supplier's security measures are disrupting. This result analysis the various parameters such as encryption time, decryption time, key generation time, and also time consumption. In cloud storage, the access control may verify the various existing method such as Ciphertext Policy Attribute-Based Encryption (CP-ABE) and Nth Truncated Ring Units (NTRU). The encryption time is 15% decreased by NTRU and 31% reduced by CP-ABE. The decryption time of the proposed method is 7.64% and 14% reduced by the existing method.
引用
收藏
页码:569 / 575
页数:7
相关论文
共 50 条
  • [31] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    ACM COMPUTING SURVEYS, 2020, 53 (04)
  • [32] Attribute-based data access control in mobile cloud computing: Taxonomy and open issues
    Sookhak, Mehdi
    Yu, F. Richard
    Khan, Muhammad Khurram
    Xiang, Yang
    Buyya, Rajkumar
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 273 - 287
  • [33] Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
    Jung, Taeho
    Li, Xiang-Yang
    Wan, Zhiguo
    Wan, Meng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) : 190 - 199
  • [34] ABBDAC: A Novel Attribute-Based Blockchain Data Access Control Scheme in Cloud Environment
    Xie, Mande
    Fu, Qiang
    Hong, Haibo
    Ren, Zichu
    Zhang, Zhen
    Kuai, Jing
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 40218 - 40228
  • [35] Efficient Blockchain Enabled Attribute-based Access Control as a Service
    Kumar, Ritik
    Palanisamy, Balaji
    Sural, Shamik
    2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA, 2022, : 87 - 96
  • [36] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [37] Overcome Key Escrow Problem with Attribute-Based Data Access Policy & Efficient Cloud Environment
    Pashte, Sourabha Vijaykumar
    Awati, Chetan J.
    Kharade, Sonam S.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [38] Contextual attribute-based access control scheme for cloud storage using blockchain technology
    Panda, Suryakanta
    Sahoo, Swagatika
    Halder, Raju
    Mondal, Samrat
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (10): : 2042 - 2062
  • [39] Accountable specific attribute-based encryption scheme for cloud access control
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [40] An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles
    Gupta, Maanak
    Awaysheh, Feras M.
    Benson, James
    Alazab, Mamoun
    Patwa, Farhan
    Sandhu, Ravi
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (06) : 4288 - 4297