R. M. Naik, H. M. T. Gadiyar, M. B. Kumar, B. K. Jeevitha, G. S. Thyagaraju, U. J. Ujwal, K. Arjun, S. M. Manasa, S. Avinash, J. A. Kumar, T. K. Sowmya, K. P. Uma, A. R. Ramaprasad
{"title":"Key management and access control based on combination of cipher text-policy attribute-based encryption with Proxy Re-Encryption for cloud data","authors":"R. M. Naik, H. M. T. Gadiyar, M. B. Kumar, B. K. Jeevitha, G. S. Thyagaraju, U. J. Ujwal, K. Arjun, S. M. Manasa, S. Avinash, J. A. Kumar, T. K. Sowmya, K. P. Uma, A. R. Ramaprasad","doi":"10.32629/jai.v6i3.748","DOIUrl":null,"url":null,"abstract":"In various cloud computing models, the data need to be protected and to access these data in secure manner is important. The cryptographic key which is used to secure these data using both in the encryption as well as in decryption it is mandatory to manage these keys to secure these keys by disclosing in public networks such as any wireless and cloud environment. Utilizing Ciphertext Policy Attribute-based Encryption (CP-ABE), which provides effective data governance and key management, for cloud data encryption. The work based on the combination of Cipher Text-Policy Attribute based Encryption and Proxy Re-Encryption is elaborated in the article (CP-ABE-PRE). The encrypted data should ideally be transformed such that it may be unlocked with new keys, without an intermediate decryption step that would allow the cloud provider to read the plaintext this process is known as data re-encryption. The computational and communication burden on users connecting to the cloud from resource constrained devices can be reduced using the proposed technique. The experimental results show for Cipher Text-Policy Attribute-Based Encryption are compared to the current algorithm (CP-ABE) demonstrate good results in encryption and decryption times. Additionally, the CP-ABE offers crucial distribution and administration options for cloud data. CP-ABE with Proxy Re-Encryption does appear to be highly efficient which proves verifiability and fairness for cloud data users to which also address revocation problem as well as collusion resistant model.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"自主智能(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.32629/jai.v6i3.748","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In various cloud computing models, the data need to be protected and to access these data in secure manner is important. The cryptographic key which is used to secure these data using both in the encryption as well as in decryption it is mandatory to manage these keys to secure these keys by disclosing in public networks such as any wireless and cloud environment. Utilizing Ciphertext Policy Attribute-based Encryption (CP-ABE), which provides effective data governance and key management, for cloud data encryption. The work based on the combination of Cipher Text-Policy Attribute based Encryption and Proxy Re-Encryption is elaborated in the article (CP-ABE-PRE). The encrypted data should ideally be transformed such that it may be unlocked with new keys, without an intermediate decryption step that would allow the cloud provider to read the plaintext this process is known as data re-encryption. The computational and communication burden on users connecting to the cloud from resource constrained devices can be reduced using the proposed technique. The experimental results show for Cipher Text-Policy Attribute-Based Encryption are compared to the current algorithm (CP-ABE) demonstrate good results in encryption and decryption times. Additionally, the CP-ABE offers crucial distribution and administration options for cloud data. CP-ABE with Proxy Re-Encryption does appear to be highly efficient which proves verifiability and fairness for cloud data users to which also address revocation problem as well as collusion resistant model.