Key management and access control based on combination of cipher text-policy attribute-based encryption with Proxy Re-Encryption for cloud data

R. M. Naik, H. M. T. Gadiyar, M. B. Kumar, B. K. Jeevitha, G. S. Thyagaraju, U. J. Ujwal, K. Arjun, S. M. Manasa, S. Avinash, J. A. Kumar, T. K. Sowmya, K. P. Uma, A. R. Ramaprasad
{"title":"Key management and access control based on combination of cipher text-policy attribute-based encryption with Proxy Re-Encryption for cloud data","authors":"R. M. Naik, H. M. T. Gadiyar, M. B. Kumar, B. K. Jeevitha, G. S. Thyagaraju, U. J. Ujwal, K. Arjun, S. M. Manasa, S. Avinash, J. A. Kumar, T. K. Sowmya, K. P. Uma, A. R. Ramaprasad","doi":"10.32629/jai.v6i3.748","DOIUrl":null,"url":null,"abstract":"In various cloud computing models, the data need to be protected and to access these data in secure manner is important. The cryptographic key which is used to secure these data using both in the encryption as well as in decryption it is mandatory to manage these keys to secure these keys by disclosing in public networks such as any wireless and cloud environment. Utilizing Ciphertext Policy Attribute-based Encryption (CP-ABE), which provides effective data governance and key management, for cloud data encryption. The work based on the combination of Cipher Text-Policy Attribute based Encryption and Proxy Re-Encryption is elaborated in the article (CP-ABE-PRE). The encrypted data should ideally be transformed such that it may be unlocked with new keys, without an intermediate decryption step that would allow the cloud provider to read the plaintext this process is known as data re-encryption. The computational and communication burden on users connecting to the cloud from resource constrained devices can be reduced using the proposed technique. The experimental results show for Cipher Text-Policy Attribute-Based Encryption are compared to the current algorithm (CP-ABE) demonstrate good results in encryption and decryption times. Additionally, the CP-ABE offers crucial distribution and administration options for cloud data. CP-ABE with Proxy Re-Encryption does appear to be highly efficient which proves verifiability and fairness for cloud data users to which also address revocation problem as well as collusion resistant model.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"自主智能(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.32629/jai.v6i3.748","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In various cloud computing models, the data need to be protected and to access these data in secure manner is important. The cryptographic key which is used to secure these data using both in the encryption as well as in decryption it is mandatory to manage these keys to secure these keys by disclosing in public networks such as any wireless and cloud environment. Utilizing Ciphertext Policy Attribute-based Encryption (CP-ABE), which provides effective data governance and key management, for cloud data encryption. The work based on the combination of Cipher Text-Policy Attribute based Encryption and Proxy Re-Encryption is elaborated in the article (CP-ABE-PRE). The encrypted data should ideally be transformed such that it may be unlocked with new keys, without an intermediate decryption step that would allow the cloud provider to read the plaintext this process is known as data re-encryption. The computational and communication burden on users connecting to the cloud from resource constrained devices can be reduced using the proposed technique. The experimental results show for Cipher Text-Policy Attribute-Based Encryption are compared to the current algorithm (CP-ABE) demonstrate good results in encryption and decryption times. Additionally, the CP-ABE offers crucial distribution and administration options for cloud data. CP-ABE with Proxy Re-Encryption does appear to be highly efficient which proves verifiability and fairness for cloud data users to which also address revocation problem as well as collusion resistant model.
基于密文-策略属性加密与代理重加密相结合的云数据密钥管理和访问控制
在各种云计算模型中,需要保护数据,以安全的方式访问这些数据非常重要。在加密和解密中用于保护这些数据的加密密钥必须管理这些密钥,以便通过在任何无线和云环境等公共网络中公开这些密钥来保护这些密钥。采用基于密文策略属性的加密(CP-ABE),为云数据加密提供有效的数据治理和密钥管理。本文详细阐述了基于密文-策略属性的加密与代理再加密相结合的工作(CP-ABE-PRE)。理想情况下,应该对加密的数据进行转换,以便可以使用新密钥解锁,而不需要中间的解密步骤(该步骤将允许云提供商读取明文)——这个过程称为数据重新加密。使用所提出的技术可以减少从资源受限设备连接到云的用户的计算和通信负担。实验结果表明,基于文本策略属性的密文加密算法与现有的CP-ABE算法相比,在加解密次数上都取得了较好的效果。此外,CP-ABE还为云数据提供了重要的分发和管理选项。具有代理再加密的CP-ABE似乎非常高效,证明了云数据用户的可验证性和公平性,同时也解决了撤销问题和抗勾结模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
0.40
自引率
0.00%
发文量
25
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信