Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search

被引:0
|
作者
Saraswathy, K. S. [1 ]
Sujatha, S. S. [2 ]
机构
[1] Manonmaniam Sundaranar Univ, Dept Comp Sci, Abishekapatti 627012, Tirunelveli, India
[2] Manonmaniam Sundarnar Univ, ST Hindu Coll, Abishekapatti 627012, Tirunelveli, India
关键词
Cloud computing; data access control; Nth Truncated Ring Units; Ciphertext Policy Attribute-Based Encryption; database authentication; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security and privacy issues regarding outsourcing data have risen significantly as cloud computing has grown in demand. Consequently, since data management has been delegated to an untrusted cloud server in the data outsourcing phase, data access control has been identified as a major problem in cloud storage systems. To overcome this problem, in this paper, the access control of cloud storage using an Attribute-Based Access Control (ABAC) approach is utilized. First, the data must be stored in the cloud and security must be strong for the user to access the data. This model takes into consideration some of the attributes of the cloud data stored in the authentication process that the database uses to maintain data around the recorded collections with the user's saved keys. The clusters have registry message permission codes, usernames, and group names, each with its own set of benefits. In advance, the data should be encrypted and transferred to the service provider as it establishes that the data is still secure. But in some cases, the supplier's security measures are disrupting. This result analysis the various parameters such as encryption time, decryption time, key generation time, and also time consumption. In cloud storage, the access control may verify the various existing method such as Ciphertext Policy Attribute-Based Encryption (CP-ABE) and Nth Truncated Ring Units (NTRU). The encryption time is 15% decreased by NTRU and 31% reduced by CP-ABE. The decryption time of the proposed method is 7.64% and 14% reduced by the existing method.
引用
收藏
页码:569 / 575
页数:7
相关论文
共 50 条
  • [1] Efficient Attribute-Based Access Control With Authorized Search in Cloud Storage
    Hao, Jialu
    Liu, Jian
    Wang, Huimei
    Liu, Lingshuang
    Xian, Ming
    Shen, Xuemin
    [J]. IEEE ACCESS, 2019, 7 : 182772 - 182783
  • [2] Attribute-Based Keyword Search and Data Access Control in Cloud
    Li, Jiazhi
    Zhang, Lei
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 382 - 386
  • [3] An efficient attribute-based hierarchical data access control scheme in cloud computing
    He, Heng
    Zheng, Liang-han
    Li, Peng
    Deng, Li
    Huang, Li
    Chen, Xiang
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [4] Efficient Attribute-Based Comparable Data Access Control
    Wang, Zhijie
    Huang, Dijiang
    Zhu, Yan
    Li, Bing
    Chung, Chun-Jen
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3430 - 3443
  • [5] An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service
    Nyamsuren Vaanchig
    Wei Chen
    Zhi-Guang Qin
    [J]. Journal of Electronic Science and Technology, 2017, 15 (01) : 90 - 98
  • [6] Auditable attribute-based data access control using blockchain in cloud storage
    V. Ezhil Arasi
    K. Indra Gandhi
    K. Kulothungan
    [J]. The Journal of Supercomputing, 2022, 78 : 10772 - 10798
  • [7] An attribute-based lightweight cloud data access control using hypergraph structure
    R. Mythili
    Revathi Venkataraman
    T. Sai Raj
    [J]. The Journal of Supercomputing, 2020, 76 : 6040 - 6064
  • [8] An attribute-based lightweight cloud data access control using hypergraph structure
    Mythili, E. R.
    Venkataraman, Revathi
    Raj, T. Sai
    [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (08): : 6040 - 6064
  • [9] Auditable attribute-based data access control using blockchain in cloud storage
    Arasi, V. Ezhil
    Gandhi, K. Indra
    Kulothungan, K.
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (08): : 10772 - 10798
  • [10] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Xia, Zhihua
    Zhang, Liangao
    Liu, Dandan
    [J]. CHINA COMMUNICATIONS, 2016, 13 (07) : 92 - 99