A Hybrid Secure Cloud Platform Maintenance Based on Improved Attribute-Based Encryption Strategies.
DOI:
https://doi.org/10.9781/ijimai.2021.11.004Keywords:
Advanced Encryption Standard (AES), Attribute-Based Encryption (ABE), Improved Attribute-Based Encryption Scheme (IABES), Cloud SecurityAbstract
In the modern era, Cloud Platforms are the most needed port to maintain documents remotely with proper security norms. The concept of cloud environments is similar to the network channel. Still, the Cloud is considered the refined form of network, in which the data can easily be stored into the server without any range restrictions. The data maintained into the remote server needs a high-security feature, and the processing power of data should be high to retrieve the data back from the respective server. In the past, there were several security schemes available to protect the remote cloud server reasonably. However, the attack possibilities over the cloud platform remain; only all the researchers continuously work on this platform without any delay. This paper introduces a hybrid data security scheme called the Improved Attribute-Based Encryption Scheme (IABES). This IABES combines two powerful data security algorithms: Advanced Encryption Standard (AES) and Attribute-Based Encryption (ABE) algorithm. These two algorithms are combined to provide massive support to the proposed approach of data maintenance over the remote cloud server with high-end security norms. This hybrid data security algorithm assures the data cannot be attacked over the server by the attacker or intruder in any case because of its robustness. The essential generation process generates a credential for the users. It cannot be identified or visible to anyone as well as the generated certificates cannot be extracted even if the corresponding user forgets the credentials. The only way to get back the certification is resetting the credential. The obtained results prove the accuracy level of the proposed cypher security schemes compared with the regular cloud security management scheme, and the proposed algorithm essential generation process is unique. No one can guess or acquire it. Even the person may be the service provider or server administrator. For all, the proposed system assures data maintenance over the cloud platform with a high level of security and robustness in Quality of Service.
Downloads
References
N. A. Wigati, A. Wibisono, and A. N. Hidayanto, “Challenges of Infrastructure in Cloud Computing for Education Field: A Systematic Literature Review,” Insight, vol. 43, no. 23, pp. 351-358, 2021.
G. Ramachandra, M. Iftikhar, and F. A Khan, “A comprehensive survey on security in cloud computing,” Procedia Computer Science, vol. 110, pp. 465-72, 2017.
M. Samvatsar and P. Kanungo, “An Analytical Review and Analysis for The Data Control and Security in Cloud Computing,” International Journal of Advanced Technology and Engineering Exploration, vol. 7, no. 73, pp. 241-246, 2020.
S. M. Sasubilli, A. K. Dubey, and A. Kumar, “A Computational and Analytical Approach for Cloud Computing Security with User Data Management,” In International Conference on Advances in Computing and Communication Engineering, IEEE, pp. 1-5, 2020.
J. Li, W. Yao, J. Han, Y. Zhang, and J. Shen, “User Collusion Avoidance CP-ABE with Efficient Attribute Revocation for Cloud Storage,” IEEE Systems Journal, vol. 12, no. 2, pp. 1767-1777, 2018.
J. Li, N. Chen and Y. Zhang, “Extended File Hierarchy Access Control Scheme with Attribute Based Encryption in Cloud Computing,” IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 2, pp. 983-993, 2019.
J. Li, Q. Yu, and Y. Zhang, “Hierarchical Attribute-Based Encryption with Continuous Leakage-Resilience,” Information Sciences, vol. 484, pp. 113-134, 2019.
J. Li, Q. Yu, Y. Zhang, and J. Shen, “Key-policy attribute-based encryption against continual auxiliary input leakage,” Information Sciences, vol. 470, pp. 175-188, 2019.
A. K. Dubey, A. K. Dubey, M. Namdev, and S.S. Shrivastava, “Cloud-user Security Based on RSA And MD5 Algorithm for Resource Attestation and Sharing in Java Environment,” In Sixth International Conference on Software Engineering, IEEE, pp. 1-8, 2012.
J. Li, Y. Wang, Y. Zhang, and J. Han, “Full Verifiability for Outsourced Decryption in Attribute Based Encryption,” IEEE Transactions on Services Computing, vol. 13, no. 3, pp. 478-487, 2017.
X. Liu, J. Ma, J. Xiong, Q. Li, and T. Zhang, “Ciphertext Policy Weighted Attribute-Based Encryption Scheme,” Journal of Xi’an Jiaotong University, vol. 47, no. 8, pp. 4448, 2013.
Y. T. Wang, K. F. Chen, and J. H. Chen, “Attribute-based traitor tracing,” Journal of Information Science and Engineering, vol. 27, no. 1, pp. 181195, 2011.
W.J. Chung and T.H. Cho, ”A Security Scheme Based on Blockchain and A Hybrid Cryptosystem to Reduce Packet Loss in IoV,” International Journal of Advanced Technology and Engineering Exploration, vol. 8, no. 81, pp. 945-956, 2021.
X. Liu, J. Ma, J. Xiong, Q. Li, and J. Ma, “Ciphertext-Policy Weighted Attribute-Based Encryption for One-Grained Access Control,” In International Conference on Intelligent Networking and Collaborative Systems, IEEE, pp. 51-57, 2013.
Z. Liu, Z. Cao, and D. S. Wong, “White-Box Traceable CiphertextPolicy Attribute-Based Encryption Supporting any Monotone Access structures,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 76-88, 2013.
J. Li, Q. Huang, X. Chen, S. S. M. Chow, D. S. Wong, and D. Xie, “Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability,’’ In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, IEEE, pp. 386-390, 2011.
Y. Jiang, W. Susilo, Y. Mu, and F. Guo, “Ciphertext-Policy Attribute-Based Encryption Against Key-Delegation Abuse in Fog Computing,” Future Generation Computer Systems, vol. 78, pp. 720-729, 2018.
Q. Li, H. Zhu, Z. Ying, and T. Zhang, “Traceable Ciphertext-Policy Attribute-Based Encryption with Variable Outsourced Decryption in Ehealth Cloud,” Wireless Communications and Mobile Computing, vol. 2018, pp. 112, 2018.
J. Zhou, Z. Cao, X. Dong, and X. Lin, “TR-MABE: White-Box Traceable and Revocable Multi-Authority Attribute-Based Encryption and Its Applications to Multi-Level Privacy-Preserving E-Healthcare Cloud Computing Systems,’’ In proceedings of IEEE Conference on Computer Communication, IEEE, pp. 2398-2406, 2015.
F. Piltan, S. TayebiHaghighi, and N. B. Sulaiman, “Comparative Study Between ARX and ARMAX System Identification,” International Journal of Intelligent Systems and Applications, vol. 9, no. 2, pp. 25-34, 2017.
Y. Yu, J. Shi, H. Li, Y. Li, X. Du, and M. Guizani, “Key-Policy AttributeBased Encryption with Keyword Search in Virtualized Environments,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 6, pp. 1242-1251, 2020.
Downloads
Published
-
Abstract182
-
PDF29