Key-cipher policy attribute-based encryption mechanism for access control of multimedia data in cloud storages

نویسندگان

چکیده

Cloud technology is advancing at a rapid pace. Many applications and multimedia data are hosted in the cloud, Security, confidentiality, efficiency key drawbacks of cloud computing. There variety access control systems on market to secure cloud. But generation time major flaw both multi-authority single authority systems. Cipher policy attribute-based encryption (CPABE) one many cryptographic algorithms available for ensuring user confidentiality which provides fine-grained control. It also addreses number issues related attribute revocation, time, handling large attributes. We present mechanism called key-cipher-policy-based ABE (KCP) this article, hybrid approach combines CP-ABE KP approaches result wide range attributes, an efficient process, addresses challenges revocation.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data

Attribute-based encryption (ABE) is a standard encryption that allows users to encrypt and decrypt data based on user attributes. I t is extension o f attribute set based encryption to improve scalability and flexibility w hile at the same time Inherits the feature of fine grained access control of ABE.It is flexible access control of encrypted data stored in the cloud. It is using access polic...

متن کامل

Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data

In the ciphertext-policy attribute based encryption (CPABE) scheme, a private key holder is related with a set of attributes while the data is encrypted under an access structure defined by the data provider. In most proposed schemes, the characteristics of the attributes are treated as same level. While in the real world circumstance, the attributes are always in the different levels. In this ...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Enhanced Cloud Data Security Through Verifiable Cipher Policy Based Encryption

Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to a...

متن کامل

Multi-Owner Data Sharing Using Key Policy Attribute-Based Encryption Method in the cloud

There is a Major problem in public clouds about the sharing of documents on attribute based policies, sharing data in a dynamic groups . With the help of advantage of low maintenance, cloud computing gives the effective solution for sharing group resource among cloud users. As the sharing of documents with different keys like attribute based encryption (ABE), and/or proxy re-encryption (PRE) ap...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2022

ISSN: ['2502-4752', '2502-4760']

DOI: https://doi.org/10.11591/ijeecs.v28.i1.pp545-550