Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search

被引:0
|
作者
Saraswathy, K. S. [1 ]
Sujatha, S. S. [2 ]
机构
[1] Manonmaniam Sundaranar Univ, Dept Comp Sci, Abishekapatti 627012, Tirunelveli, India
[2] Manonmaniam Sundarnar Univ, ST Hindu Coll, Abishekapatti 627012, Tirunelveli, India
关键词
Cloud computing; data access control; Nth Truncated Ring Units; Ciphertext Policy Attribute-Based Encryption; database authentication; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security and privacy issues regarding outsourcing data have risen significantly as cloud computing has grown in demand. Consequently, since data management has been delegated to an untrusted cloud server in the data outsourcing phase, data access control has been identified as a major problem in cloud storage systems. To overcome this problem, in this paper, the access control of cloud storage using an Attribute-Based Access Control (ABAC) approach is utilized. First, the data must be stored in the cloud and security must be strong for the user to access the data. This model takes into consideration some of the attributes of the cloud data stored in the authentication process that the database uses to maintain data around the recorded collections with the user's saved keys. The clusters have registry message permission codes, usernames, and group names, each with its own set of benefits. In advance, the data should be encrypted and transferred to the service provider as it establishes that the data is still secure. But in some cases, the supplier's security measures are disrupting. This result analysis the various parameters such as encryption time, decryption time, key generation time, and also time consumption. In cloud storage, the access control may verify the various existing method such as Ciphertext Policy Attribute-Based Encryption (CP-ABE) and Nth Truncated Ring Units (NTRU). The encryption time is 15% decreased by NTRU and 31% reduced by CP-ABE. The decryption time of the proposed method is 7.64% and 14% reduced by the existing method.
引用
收藏
页码:569 / 575
页数:7
相关论文
共 50 条
  • [41] Efficiently Attribute-Based Access Control for Mobile Cloud Storage System
    Lv, Zhiquan
    Chi, Jialin
    Zhang, Min
    Feng, Dengguo
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 292 - 299
  • [42] Authorization Management in Multi-Cloud Collaboration using Attribute-based Access Control
    John, John C.
    Sural, Shamik
    Gupta, Arobinda
    2016 15TH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING (ISPDC), 2016, : 190 - 195
  • [43] A survey on attribute-based encryption schemes of access control in cloud environments
    Hwang, M.-S. (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (15):
  • [44] An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing
    Xie, Xingxing
    Ma, Hua
    Li, Jin
    Chen, Xiaofeng
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (16) : 2349 - 2367
  • [45] Adopting Attribute-Based Access Control to Data Distribution Service
    Murugesan, Priya
    Chinnappa, Swanima
    Alaerjan, Alaa
    Kim, Dae-Kyoo
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA), 2017, : 112 - 115
  • [46] On Attribute-Based Encryption for Access Control to Multidimensional Data Structures
    Epishkina, Anna
    Zapechnikov, Sergey
    BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES (BICA) FOR YOUNG SCIENTISTS, 2018, 636 : 251 - 256
  • [47] Crowd review and attribute-based credit computation for an access control mechanism in cloud data centers
    Dubey A.K.
    Mishra V.
    International Journal of Computers and Applications, 2023, 45 (02) : 212 - 219
  • [48] Efficient Anonymous Attribute-Based Encryption with Access Policy Hidden for Cloud Computing
    Huang, Chanying
    Yan, Kedong
    Wei, Songjie
    Zhang, Gongxuan
    Lee, Dong Hoon
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 266 - 270
  • [49] Attribute-based Access Control of Data Sharing Based on Hyperledger Blockchain
    Alniamy, Afnan
    Taylor, Bradley D.
    2020 2ND INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY (ICBCT 2020), 2020, : 135 - 139
  • [50] Securing cloud access with enhanced attribute-based cryptography
    Kumar, Ashutosh
    Verma, Garima
    COMPUTING, 2024, 106 (12) : 4193 - 4207