Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption
Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data access while securing Cloud data. The encrypted dat...
Guardado en:
Autores principales: | , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
MDPI AG
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/072655bf294540c586ac32985d2d5ded |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:072655bf294540c586ac32985d2d5ded |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:072655bf294540c586ac32985d2d5ded2021-11-25T17:39:47ZTowards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption10.3390/fi131102791999-5903https://doaj.org/article/072655bf294540c586ac32985d2d5ded2021-10-01T00:00:00Zhttps://www.mdpi.com/1999-5903/13/11/279https://doaj.org/toc/1999-5903Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data access while securing Cloud data. The encrypted data are sent to Cloud storage with an access policy defined by the data owner. Only authorized users can decrypt the encrypted data. However, the access policy of the encrypted data is in readable form, which results in privacy leakage. To address this issue, we proposed a reinforcement hiding in access policy over Cloud storage by enhancing the Ciphertext Policy Attribute-based Encryption (CP-ABE) algorithm. Besides the encryption process, the reinforced CP-ABE used logical connective operations to hide the attribute value of data in the access policy. These attributes were converted into scrambled data along with a ciphertext form that provides a better unreadability feature. It means that a two-level concealed tactic is employed to secure data from any unauthorized access during a data transaction. Experimental results revealed that our reinforced CP-ABE had a low computational overhead and consumed low storage costs. Furthermore, a case study on security analysis shows that our approach is secure against a passive attack such as traffic analysis.Siti Dhalila Mohd SatarMasnida HussinZurina Mohd HanapiMohamad Afendee MohamedMDPI AGarticleCP-ABEfine-grained access controlpolicy hidingprivacy-preservingInformation technologyT58.5-58.64ENFuture Internet, Vol 13, Iss 279, p 279 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
CP-ABE fine-grained access control policy hiding privacy-preserving Information technology T58.5-58.64 |
spellingShingle |
CP-ABE fine-grained access control policy hiding privacy-preserving Information technology T58.5-58.64 Siti Dhalila Mohd Satar Masnida Hussin Zurina Mohd Hanapi Mohamad Afendee Mohamed Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption |
description |
Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data access while securing Cloud data. The encrypted data are sent to Cloud storage with an access policy defined by the data owner. Only authorized users can decrypt the encrypted data. However, the access policy of the encrypted data is in readable form, which results in privacy leakage. To address this issue, we proposed a reinforcement hiding in access policy over Cloud storage by enhancing the Ciphertext Policy Attribute-based Encryption (CP-ABE) algorithm. Besides the encryption process, the reinforced CP-ABE used logical connective operations to hide the attribute value of data in the access policy. These attributes were converted into scrambled data along with a ciphertext form that provides a better unreadability feature. It means that a two-level concealed tactic is employed to secure data from any unauthorized access during a data transaction. Experimental results revealed that our reinforced CP-ABE had a low computational overhead and consumed low storage costs. Furthermore, a case study on security analysis shows that our approach is secure against a passive attack such as traffic analysis. |
format |
article |
author |
Siti Dhalila Mohd Satar Masnida Hussin Zurina Mohd Hanapi Mohamad Afendee Mohamed |
author_facet |
Siti Dhalila Mohd Satar Masnida Hussin Zurina Mohd Hanapi Mohamad Afendee Mohamed |
author_sort |
Siti Dhalila Mohd Satar |
title |
Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption |
title_short |
Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption |
title_full |
Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption |
title_fullStr |
Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption |
title_full_unstemmed |
Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption |
title_sort |
towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption |
publisher |
MDPI AG |
publishDate |
2021 |
url |
https://doaj.org/article/072655bf294540c586ac32985d2d5ded |
work_keys_str_mv |
AT sitidhalilamohdsatar towardsvirtuousclouddatastorageusingaccesspolicyhidinginciphertextpolicyattributebasedencryption AT masnidahussin towardsvirtuousclouddatastorageusingaccesspolicyhidinginciphertextpolicyattributebasedencryption AT zurinamohdhanapi towardsvirtuousclouddatastorageusingaccesspolicyhidinginciphertextpolicyattributebasedencryption AT mohamadafendeemohamed towardsvirtuousclouddatastorageusingaccesspolicyhidinginciphertextpolicyattributebasedencryption |
_version_ |
1718412086837510144 |