IJCNIS Vol. 17, No. 2, 8 Apr. 2025
Cover page and Table of Contents: PDF (size: 1588KB)
PDF (1588KB), PP.101-114
Views: 0 Downloads: 0
Attribute-based Encryption, Cipher-text, Advanced Encryption Standard (AES), Data Decryption and Data Encryption
Data management has been revolutionized because cloud computing technologies have increased user barriers to expensive infrastructure and storage limits. The advantages of the cloud have made it possible for significant cloud implementation in major businesses. However, the privacy of cloud-based data remains the significant and most crucial problem for data owners due to various security risks. Many researchers have proposed various methods to maintain the confidentiality of the data, including attribute-based encryption (ABE). Though, the cloud is still dogged mainly by the security issue. To protect data privacy, the new encryption model "Advanced Encryption Standard- Improved Quantum Ciphertext Policy and Attribute-based Encryption" (AES-IQCP-ABE) is introduced in the present research. The suggested method twice encrypts the data and the attributes using the ABE at first. Second, using the AES technique, the encrypted data is encrypted before being delivered to authorized users. The dynamic, chaotic map function is used in the proposed approach to protecting user attributes throughout the initialization of the key, encryption of data, and decryption of data processes. For the encryption process, the inputs used in the proposed research are both unstructured and structured extensive medical data. Regarding computational memory, time for cloud data encryption, and decryption, the proposed model outperforms the previous ABE-based encryption and decryption algorithms.
Jayaprakash Jayachandran, Dahlia Sam, Kanya Nataraj, "Efficient Cloud Computing Security Using Hybrid Optimized AES-IQCP-ABE Cryptography Algorithm", International Journal of Computer Network and Information Security(IJCNIS), Vol.17, No.2, pp.101-114, 2025. DOI:10.5815/ijcnis.2025.02.07
[1]S. Kumaresan and V. Shanmugam, “Time-variant attribute-based multitype encryption algorithm for improved cloud data security using a user profile,” The Journal of Supercomputing, vol. 76, pp.6094-6112, 2020. https://doi.org/10.1007/s11227-019-03118-8
[2]F. Thabit, S. Alhomdy, A.H. Al-Ahdal and S. Jagtap, A new lightweight cryptographic algorithm for enhancing data security in cloud computing,” Global Transitions Proceedings, vol. 2, no. 1, pp.91-99, 2021. https://doi.org/10.1016/j.gltp.2021.01.013
[3]P. Sharma, R. Jindal and M.D. Borah, “Blockchain-based cloud storage system with CP-ABE-based access control and revocation process,” The Journal of Supercomputing, pp.1-29, 2022. https://doi.org/10.1007/s11227-021-04179-4
[4]K.K. Singamaneni, K. Ramana, G. Dhiman, S. Singh, and B. Yoon, “A novel blockchain and Bi-linear polynomial-based QCP-ABE framework for privacy and security over the complex cloud data,” Sensors, vol. 21, no. 21, pp.7300, 2021. https://doi.org/10.3390/s21217300
[5]K.R. Sajay, S.S. Babu and Y. Vijayalakshmi, “Enhancing the security of cloud data using a hybrid encryption algorithm,” Journal of Ambient Intelligence and Humanized Computing, pp.1-10, 2019. https://doi.org/10.1080/08839514.2021.1991661
[6]B. Seth, S. Dalal, D.N. Le, V. Jaglan, N. Dahiya, A. Agrawal, M.M. Sharma, D. Prakash and K.D. Verma, “Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm,” Computers, Materials & Continua, vol. 67, no. 1, 2021. DOI:10.32604/cmc.2021.014466
[7]D. Rayappan and M. Pandiyan, “Lightweight Feistel structure-based hybrid-crypto model for multimedia data security over uncertain cloud environment,” Wireless Networks, vol. 27, pp.981-999, 2021. https://doi.org/10.1007/s11276-020-02486-x
[8]I.G. Amalarethinam and H.M. Leena, “Enhanced RSA algorithm with varying key sizes for data security in the cloud,” In 2017 World Congress on Computing and Communication Technologies (WCCCT) (pp. 172-175). IEEE, 2017, February. DOI: 10.1109/WCCCT.2016.50
[9]S. Hussaini, “Cyber security in the cloud using blowfish encryption,” Int. J. Inf. Technol. (IJIT), 6(5), 2020. DOI: 10.1002/9781119488149
[10]D. Commey, S. Griffith and J. Dzisi, “Performance comparison of 3DES AES, blowfish, and RSA for dataset classification and encryption in cloud data storage. International Journal of Computer Applications, vol. 177, no. 40, pp.17-22, 2020. Doi: 10.5120/ijca2020919897
[11]K.K. Singamaneni and P.S. Naidu, “An efficient quantum hash-based CP-ABE framework on cloud storage data,” International Journal of Advanced Intelligence Paradigms, vol. 22, no. 3-4, pp.336-347, 2022. https://doi.org/10.1504/IJAIP.2022.124317
[12]K.K. Singamaneni, A. Juneja, M. Abd-Elnaby, K. Gulati, K. Kotecha and A.S. Kumar, “An Enhanced Dynamic Non-linearNon-linear Polynomial Integrity-Based QHCP-ABE Framework for Big Data Privacy and Security,” Security and Communication Networks, pp. 1-20, 2022. https://doi.org/10.1155/2022/4206000
[13]H. Wang, J. Liang, Y. Ding, S. Tang and Y. Wang, “Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health. Computer Standards & Interfaces, vol. 84, pp.103696, 2023. https://doi.org/10.1016/j.csi.2022.103696
[14]Y. Jiang, X. Xu and F. Xiao, “Attribute-based encryption with blockchain protection scheme for electronic health records,” IEEE Transactions on Network and Service Management, pp. 1-20, 2022. DOI: 10.1109/TNSM.2022.3193707
[15]Y. Zuo, Z. Kang, J. Xu and Z. Chen, “BCAS: a blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing,” International Journal of Distributed Sensor Networks, vol. 17, no. 3, p.1550147721999616, 2021. https://doi.org/10.1177/1550147721999616
[16]K. K. Singamaneni and P.S. Naidu, “IBLIND Quantum Computing and HASBE for Secure Cloud Data Storage and Accessing,” Rev. d'Intelligence Artif., vol. 33, no. 1, pp.33-37, 2019. https://doi.org/10.18280/ria.330106
[17]C. Huang, S. Wei and A. Fu, “An efficient privacy-preserving attribute-based encryption with hidden policy for cloud storage,” Journal of Circuits, Systems and Computers, vol. 28(11), pp.1950186, 2019. https://doi.org/10.1142/S021812661950186X
[18]S. Chandel, G. Yang and S. Chakravarty, “RSA-CP-IDABE: a secure framework for multi-user and multi-owner cloud environments. Information, vol. 11, no. 8, pp.382, 2020. https://doi.org/10.3390/info11080382
[19]J. Wei and L. Zhang, “Ciphertext policy attribute-based encryption with hierarchical domain authorities and users in the cloud,” International Journal of High-Performance Computing and Networking, 10(6), pp.524-533, 2017. https://doi.org/10.1504/IJHPCN.2017.087470
[20]M. Bakro, S.K. Bisoy, A.K. Patel, and M.A. Naal, “Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms,” In Blockchain-based Internet of Things 1, pp. 139-170, 2022. Singapore: Springer Singapore. https://doi.org/10.1007/978-981-16-9260-4_6
[21]P. Chinnasamy, S. Padmavathi, R. Swathy and S. Rakesh, “Efficient data security using hybrid cryptography on cloud computing,” In Inventive Communication and Computational Technologies: Proceedings of ICICCT 2020 1, pp. 537-547, 2021. Springer Singapore. https://doi.org/10.1007/978-981-15-7345-3_46
[22]S. Rehman, N. Talat Bajwa, M.A. Shah, A.O. Aseeri and A. Anjum, “Hybrid AES-ECC model for the security of data over cloud storage,” Electronics, 10(21), p.2673, 2021. https://doi.org/10.3390/electronics10212673
[23]G. Verma and A. Kumar, “Novel quantum key distribution and attribute-based encryption for cloud data security,” Concurrency and Computation: Practice and Experience, pp.e7700, 2023. https://doi.org/10.1002/cpe.7700
[24]D. K. M. Hodowu, D. R. Korda and E. D. Ansong, “An enhancement of data security in cloud computing with an implementation of a two-level cryptographic technique using AES and ECC algorithm,” Int. J. Eng. Res. Technol, vol. 9, pp. 639-650, 2020.
[25]K. Sundar, S. Sasikumar and C. Jayakumar, “Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud,” Quantum Information Processing, vol. 21, no. 3, pp.115, 2022. https://doi.org/10.1007/s11128-022-03452-6
[26]K.K. Singamaneni, A. Nauman, S. Juneja, G. Dhiman, W. Viriyasitavat, Y. Hamid and J.H. Anajemba, “An Efficient Hybrid QHCP-ABE Model to Improve Cloud Data Integrity and Confidentiality,” Electronics, vol. 11, no. 21, pp.3510, 2022. https://doi.org/10.3390/electronics11213510