Multi authority Ciphertext-Policy Attribute-Based encryption for security enhancement in cloud storage unit

被引:4
|
作者
Catherine, V. Reena [1 ]
Nargunam, A. Shajin [2 ]
机构
[1] Noorul Islam Ctr Higher Educ, Dept Comp Sci, Kumaracoil 629180, India
[2] Noorul Islam Ctr Higher Educ, Dept CSE, Kumaracoil 629180, India
关键词
Multi authority; Security enhancement; Cloud storage unit; Ciphertext policy attribute-based encryption and multiuser; SCHEME; SIGNCRYPTION;
D O I
10.1016/j.seta.2022.102556
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Multi Authority Ciphertext-Policy Attribute-Based Encryption (MCP-ABE) can be developed aimed at enabling efficient secure operation in this research. The proposed methodology is developed to achieve two main characteristics such as to avoid multiuser illegal share their private key and provide data owner to access the data and flexibility to change their access policy. The proposed methodology is providing high security of multi authority with different traceable and dynamic policy updating procedure. The proposed method is implemented in Java and analyzed with performance metrices such as key size, computation time and functionality. Compared to traditional cryptographic methods, attribute-based encryption has a number of benefits, including its adaptable and fine-grained control of access. Additionally, it is independent of key sharing and management methods that may protect against security attacks, a method of undermining encryption. The proposed methodology is protecting the users with different conditions such as data protection, fraud prevention, message detection and general attack resistance. To validate the performance of the proposed methodology, it can be contrasted with the conventional methods such as Ciphertext-Policy Attribute-Based Signcryption with Outsourced Designcryption (CP-OABSC) and revocable signature (CP-ABSC) with Ciphertext-Policy Attribute-Based Signcryption With Accountable and Verifiable Outsourced Designcryption (CP-ABSc-AVODs) respectively.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [2] Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [3] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu J.
    He X.
    Yan X.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [4] Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
    Yu, Gang
    Wang, Yongjuan
    Cao, Zhenfu
    Lin, Jian
    Wang, Xiangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04):
  • [5] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [6] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Yong CHENG
    Zhi-ying WANG
    Jun MA
    Jiang-jiang WU
    Song-zhu MEI
    Jiang-chun REN
    Frontiers of Information Technology & Electronic Engineering, 2013, (02) : 85 - 97
  • [7] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Cheng, Yong
    Wang, Zhi-ying
    Ma, Jun
    Wu, Jiang-jiang
    Mei, Song-zhu
    Ren, Jiang-chun
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (02): : 85 - 97
  • [8] Searchable Ciphertext-Policy Attribute-Based Encryption with Multi-Keywords for Secure Cloud Storage
    Zhao, Zhiyuan
    Sun, Lei
    Li, Zuohui
    Liu, Ying
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND PATTERN RECOGNITION (ICCPR 2018), 2018, : 35 - 41
  • [9] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Yong Cheng
    Zhi-ying Wang
    Jun Ma
    Jiang-jiang Wu
    Song-zhu Mei
    Jiang-chun Ren
    Journal of Zhejiang University SCIENCE C, 2013, 14 : 85 - 97
  • [10] Security analysis for a ciphertext-policy attribute-based encryption scheme
    Zeng, Fugeng
    Xu, Chunxiang
    Zhang, Xinpeng
    Advances in Information Sciences and Service Sciences, 2012, 4 (12): : 201 - 207