Key-cipher policy attribute-based encryption mechanism for access control of multimedia data in cloud storages
نویسندگان
چکیده
Cloud technology is advancing at a rapid pace. Many applications and multimedia data are hosted in the cloud, Security, confidentiality, efficiency key drawbacks of cloud computing. There variety access control systems on market to secure cloud. But generation time major flaw both multi-authority single authority systems. Cipher policy attribute-based encryption (CPABE) one many cryptographic algorithms available for ensuring user confidentiality which provides fine-grained control. It also addreses number issues related attribute revocation, time, handling large attributes. We present mechanism called key-cipher-policy-based ABE (KCP) this article, hybrid approach combines CP-ABE KP approaches result wide range attributes, an efficient process, addresses challenges revocation.
منابع مشابه
Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data
Attribute-based encryption (ABE) is a standard encryption that allows users to encrypt and decrypt data based on user attributes. I t is extension o f attribute set based encryption to improve scalability and flexibility w hile at the same time Inherits the feature of fine grained access control of ABE.It is flexible access control of encrypted data stored in the cloud. It is using access polic...
متن کاملCiphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data
In the ciphertext-policy attribute based encryption (CPABE) scheme, a private key holder is related with a set of attributes while the data is encrypted under an access structure defined by the data provider. In most proposed schemes, the characteristics of the attributes are treated as same level. While in the real world circumstance, the attributes are always in the different levels. In this ...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملEnhanced Cloud Data Security Through Verifiable Cipher Policy Based Encryption
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to a...
متن کاملMulti-Owner Data Sharing Using Key Policy Attribute-Based Encryption Method in the cloud
There is a Major problem in public clouds about the sharing of documents on attribute based policies, sharing data in a dynamic groups . With the help of advantage of low maintenance, cloud computing gives the effective solution for sharing group resource among cloud users. As the sharing of documents with different keys like attribute based encryption (ABE), and/or proxy re-encryption (PRE) ap...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2022
ISSN: ['2502-4752', '2502-4760']
DOI: https://doi.org/10.11591/ijeecs.v28.i1.pp545-550