Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption

Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data access while securing Cloud data. The encrypted dat...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Siti Dhalila Mohd Satar, Masnida Hussin, Zurina Mohd Hanapi, Mohamad Afendee Mohamed
Formato: article
Lenguaje:EN
Publicado: MDPI AG 2021
Materias:
Acceso en línea:https://doaj.org/article/072655bf294540c586ac32985d2d5ded
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:072655bf294540c586ac32985d2d5ded
record_format dspace
spelling oai:doaj.org-article:072655bf294540c586ac32985d2d5ded2021-11-25T17:39:47ZTowards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption10.3390/fi131102791999-5903https://doaj.org/article/072655bf294540c586ac32985d2d5ded2021-10-01T00:00:00Zhttps://www.mdpi.com/1999-5903/13/11/279https://doaj.org/toc/1999-5903Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data access while securing Cloud data. The encrypted data are sent to Cloud storage with an access policy defined by the data owner. Only authorized users can decrypt the encrypted data. However, the access policy of the encrypted data is in readable form, which results in privacy leakage. To address this issue, we proposed a reinforcement hiding in access policy over Cloud storage by enhancing the Ciphertext Policy Attribute-based Encryption (CP-ABE) algorithm. Besides the encryption process, the reinforced CP-ABE used logical connective operations to hide the attribute value of data in the access policy. These attributes were converted into scrambled data along with a ciphertext form that provides a better unreadability feature. It means that a two-level concealed tactic is employed to secure data from any unauthorized access during a data transaction. Experimental results revealed that our reinforced CP-ABE had a low computational overhead and consumed low storage costs. Furthermore, a case study on security analysis shows that our approach is secure against a passive attack such as traffic analysis.Siti Dhalila Mohd SatarMasnida HussinZurina Mohd HanapiMohamad Afendee MohamedMDPI AGarticleCP-ABEfine-grained access controlpolicy hidingprivacy-preservingInformation technologyT58.5-58.64ENFuture Internet, Vol 13, Iss 279, p 279 (2021)
institution DOAJ
collection DOAJ
language EN
topic CP-ABE
fine-grained access control
policy hiding
privacy-preserving
Information technology
T58.5-58.64
spellingShingle CP-ABE
fine-grained access control
policy hiding
privacy-preserving
Information technology
T58.5-58.64
Siti Dhalila Mohd Satar
Masnida Hussin
Zurina Mohd Hanapi
Mohamad Afendee Mohamed
Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption
description Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data access while securing Cloud data. The encrypted data are sent to Cloud storage with an access policy defined by the data owner. Only authorized users can decrypt the encrypted data. However, the access policy of the encrypted data is in readable form, which results in privacy leakage. To address this issue, we proposed a reinforcement hiding in access policy over Cloud storage by enhancing the Ciphertext Policy Attribute-based Encryption (CP-ABE) algorithm. Besides the encryption process, the reinforced CP-ABE used logical connective operations to hide the attribute value of data in the access policy. These attributes were converted into scrambled data along with a ciphertext form that provides a better unreadability feature. It means that a two-level concealed tactic is employed to secure data from any unauthorized access during a data transaction. Experimental results revealed that our reinforced CP-ABE had a low computational overhead and consumed low storage costs. Furthermore, a case study on security analysis shows that our approach is secure against a passive attack such as traffic analysis.
format article
author Siti Dhalila Mohd Satar
Masnida Hussin
Zurina Mohd Hanapi
Mohamad Afendee Mohamed
author_facet Siti Dhalila Mohd Satar
Masnida Hussin
Zurina Mohd Hanapi
Mohamad Afendee Mohamed
author_sort Siti Dhalila Mohd Satar
title Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption
title_short Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption
title_full Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption
title_fullStr Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption
title_full_unstemmed Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption
title_sort towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption
publisher MDPI AG
publishDate 2021
url https://doaj.org/article/072655bf294540c586ac32985d2d5ded
work_keys_str_mv AT sitidhalilamohdsatar towardsvirtuousclouddatastorageusingaccesspolicyhidinginciphertextpolicyattributebasedencryption
AT masnidahussin towardsvirtuousclouddatastorageusingaccesspolicyhidinginciphertextpolicyattributebasedencryption
AT zurinamohdhanapi towardsvirtuousclouddatastorageusingaccesspolicyhidinginciphertextpolicyattributebasedencryption
AT mohamadafendeemohamed towardsvirtuousclouddatastorageusingaccesspolicyhidinginciphertextpolicyattributebasedencryption
_version_ 1718412086837510144