Javascript must be enabled to continue!
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
View through CrossRef
Cipher text-Policy Attribute-Based Encryption is an access control technique widely used in cloud computing for enforcing data access policies based on attributes. However, existing Cipher text-Policy Attribute-Based Encryption schemes suffer from an issue of user’s privacy leakage and increasing cipher text size as the number of attributes in the access policy grows, leading to computational overheads and security vulnerabilities. In this research, we propose a modified Cipher text-Policy Attribute-Based Encryption scheme that addresses both privacy preservation and the problem of increasing cipher text size. Our system achieves a significant reduction in cipher text size, regardless of the number of user-given attributes, thereby ensuring efficiency and enhancing data privacy. We accomplish this by implementing an access policy hiding mechanism that conceals the attribute location and adapting OptiSize Text to eliminates redundant text in input files. Experimental results demonstrate the effectiveness of our proposed system in overcoming challenges related to data privacy and computational overheads. By significantly reducing encryption time and cipher text size, our scheme improves efficiency and enhances the security of cloud computing applications.
Title: Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Description:
Cipher text-Policy Attribute-Based Encryption is an access control technique widely used in cloud computing for enforcing data access policies based on attributes.
However, existing Cipher text-Policy Attribute-Based Encryption schemes suffer from an issue of user’s privacy leakage and increasing cipher text size as the number of attributes in the access policy grows, leading to computational overheads and security vulnerabilities.
In this research, we propose a modified Cipher text-Policy Attribute-Based Encryption scheme that addresses both privacy preservation and the problem of increasing cipher text size.
Our system achieves a significant reduction in cipher text size, regardless of the number of user-given attributes, thereby ensuring efficiency and enhancing data privacy.
We accomplish this by implementing an access policy hiding mechanism that conceals the attribute location and adapting OptiSize Text to eliminates redundant text in input files.
Experimental results demonstrate the effectiveness of our proposed system in overcoming challenges related to data privacy and computational overheads.
By significantly reducing encryption time and cipher text size, our scheme improves efficiency and enhances the security of cloud computing applications.
Related Results
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Research on Ciphertext‐Policy Attribute‐Based Encryption with Attribute Level User Revocation in Cloud Storage
Research on Ciphertext‐Policy Attribute‐Based Encryption with Attribute Level User Revocation in Cloud Storage
Attribute‐based encryption (ABE) scheme is more and more widely used in the cloud storage, which can achieve fine‐grained access control. However, it is an important challenge to s...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key
Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key
As a method for providing security of the messages sent via a public channel in the case of potential coercive attacks there had been proposed algorithms and protocols of deniable ...
Is cloud computing a game-changer for SME financial performance? Unveiling the mediating role of organizational agility through PLS-SEM
Is cloud computing a game-changer for SME financial performance? Unveiling the mediating role of organizational agility through PLS-SEM
PurposeCloud computing services are game-changing in empowering organizations to drive innovation and unlock new growth opportunities. Accordingly, this study aims to examine the d...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...

