Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search

Authors

  • K. S. Saraswathy Manonmaniam Sundaranar university, Department of Computer Science, Abishekapatti, Tirunelveli – 627012.
  • S. S. Sujatha Manonmaniam Sundarnar university, S.T.Hindu College, Abishekapatti, Tirunelveli – 627012.

DOI:

https://doi.org/10.32985/ijeces.13.7.9

Keywords:

Cloud computing, data access control, database authentication, Ciphertext Policy Attribute Based Encryption, Nth Truncated Ring Units

Abstract

The security and privacy issues regarding outsourcing data have risen significantly as cloud computing has grown in demand. Consequently, since data management has been delegated to an untrusted cloud server in the data outsourcing phase, data access control has been identified as a major problem in cloud storage systems. To overcome this problem, in this paper, the access control of cloud storage using an Attribute-Based Access Control (ABAC) approach is utilized. First, the data must be stored in the cloud and security must be strong for the user to access the data. This model takes into consideration some of the attributes of the cloud data stored in the authentication process that the database uses to maintain data around the recorded collections with the user's saved keys. The clusters have registry message permission codes, usernames, and group names, each with its own set of benefits. In advance, the data should be encrypted and transferred to the service provider as it establishes that the data is still secure. But in some cases, the supplier's security measures are disrupting. This result analysis the various parameters such as encryption time, decryption time, key generation time, and also time consumption. In cloud storage, the access control may verify the various existing method such as Ciphertext Policy Attribute-Based Encryption (CP-ABE) and Nth Truncated Ring Units (NTRU). The encryption time is 15% decreased by NTRU and 31% reduced by CP-ABE. The decryption time of the proposed method is 7.64% and 14% reduced by the existing method.

Downloads

Published

2022-09-30

How to Cite

[1]
K. S. Saraswathy and S. S. Sujatha, “Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search”, IJECES, vol. 13, no. 7, pp. 569-575, Sep. 2022.

Issue

Section

Original Scientific Papers