Abstract: Security and privacy are very important issues in cloud computing. Thus, with these versatile cloud services, when the weak data stored within the cloud storage servers, there are some challenging which has to be managed like its security issues, Data Privacy, Data Confidentiality, Data Sharing and its integrity over the cloud servers dynamically. In this vast environment, authenticity and data access control must also be maintained. In the cloud computing environment, attribute–based encryption (ABE) is a significant version of cryptographic technique. The basic technique for ABE is public key encryption, which provides one too many encryptions. Here, the private key of users and the cipher-text both rely on attributes, such that decryption is only possible when the set of attributes of users key matches the set of attributes of cipher-text with its corresponding access policy. Thus, an opponent could grant access to the sensitive information that holds multiple keys, if it has at least one individual key for accession. The techniques based on ABE consist of two types KP-ABE (Key policy ABE) where the user’s personal key is linked to an access structure (or access policy) over attributes and cipher-text is connected to the set of attributes, and CP-ABE (cipher-text policy ABE) is vice versa. Finally, experiment simulation shows that the proposed scheme is highly efficient in terms of policy update and file update.

Keywords: Attribute-based encryption (ABE), Cipher text policy (CP), Cloud computing, File update, Policy update


PDF | DOI: 10.17148/IARJSET.2022.9540

Open chat