Author
Listed:
- Siti Dhalila Mohd Satar
(Department of Communication Technology and Networks, Universiti Putra Malaysia (UPM), Serdang 43400, Selangor, Malaysia
Centre of Computer Science Study, Universiti Sultan Zainal Abidin, Kampus Besut, Besut 22200, Terengganu, Malaysia)
- Masnida Hussin
(Department of Communication Technology and Networks, Universiti Putra Malaysia (UPM), Serdang 43400, Selangor, Malaysia)
- Zurina Mohd Hanapi
(Department of Communication Technology and Networks, Universiti Putra Malaysia (UPM), Serdang 43400, Selangor, Malaysia)
- Mohamad Afendee Mohamed
(Centre of Computer Science Study, Universiti Sultan Zainal Abidin, Kampus Besut, Besut 22200, Terengganu, Malaysia)
Abstract
Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data access while securing Cloud data. The encrypted data are sent to Cloud storage with an access policy defined by the data owner. Only authorized users can decrypt the encrypted data. However, the access policy of the encrypted data is in readable form, which results in privacy leakage. To address this issue, we proposed a reinforcement hiding in access policy over Cloud storage by enhancing the Ciphertext Policy Attribute-based Encryption (CP-ABE) algorithm. Besides the encryption process, the reinforced CP-ABE used logical connective operations to hide the attribute value of data in the access policy. These attributes were converted into scrambled data along with a ciphertext form that provides a better unreadability feature. It means that a two-level concealed tactic is employed to secure data from any unauthorized access during a data transaction. Experimental results revealed that our reinforced CP-ABE had a low computational overhead and consumed low storage costs. Furthermore, a case study on security analysis shows that our approach is secure against a passive attack such as traffic analysis.
Suggested Citation
Siti Dhalila Mohd Satar & Masnida Hussin & Zurina Mohd Hanapi & Mohamad Afendee Mohamed, 2021.
"Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption,"
Future Internet, MDPI, vol. 13(11), pages 1-18, October.
Handle:
RePEc:gam:jftint:v:13:y:2021:i:11:p:279-:d:669099
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:13:y:2021:i:11:p:279-:d:669099. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.