Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data
PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribut...
Saved in:
Published in | International journal of pervasive computing and communications Vol. 20; no. 5; pp. 593 - 606 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Bingley
Emerald Group Publishing Limited
12.11.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process. |
---|---|
AbstractList | PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process. |
Author | Sowmya, T K Bharathrajkumar, M Sharath, S M H Manoj T Gadiyar Mohan, Naik R |
Author_xml | – sequence: 1 givenname: Naik surname: Mohan middlename: R fullname: Mohan, Naik R – sequence: 2 fullname: H Manoj T Gadiyar – sequence: 3 givenname: S surname: Sharath middlename: M fullname: Sharath, S M – sequence: 4 givenname: M surname: Bharathrajkumar fullname: Bharathrajkumar, M – sequence: 5 givenname: T surname: Sowmya middlename: K fullname: Sowmya, T K |
BookMark | eNo9TV9LwzAcDDLBOfcFfAr4HE1-WZr0UcrUyUAfFHwQRv78yiI1rW0Kzk9vURHuuOM47k7JLLUJCTkX_FIIbq42949VxXjBgAOwifKIzIVeAdPSvMz-vRYnZDkM0XGuoTQa1Jy8rtPeJo-B-tjtsacZPzPr2ib6A7U599GNGZmzw1TB5PtDl2ObqE2BDthH28Qv-5NMeMcQLfVNOwYabLZn5Li2zYDLP12Q55v1U3XHtg-3m-p6yzwUJjOvrQNVIgQ0tV5phyHUElDWjocgUGChwSjunHcASiEAKqELy5UuSmfkglz87nZ9-zHikHdv7din6XInBShTgilK-Q298ln- |
ContentType | Journal Article |
Copyright | Emerald Publishing Limited. |
Copyright_xml | – notice: Emerald Publishing Limited. |
DBID | 7SC 7SP 7XB 8FD 8FE 8FG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U |
DOI | 10.1108/IJPCC-06-2022-0223 |
DatabaseName | Computer and Information Systems Abstracts Electronics & Communications Abstracts ProQuest Central (purchase pre-March 2016) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central UK/Ireland Advanced Technologies & Aerospace Database ProQuest Central Essentials ProQuest Central (New) Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
DatabaseTitle | Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | Computer Science Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1742-738X |
EndPage | 606 |
GroupedDBID | 0R~ 29J 3FY 4.4 5VS 70U 7SC 7SP 7XB 8FD 8FE 8FG AAGBP AAMCF AAPSD AATHL AAUDR ABIJV ABJNI ABKQV ABSDC ABYQI ACGFS ACZLT ADOMW AEBZA AFKRA AFNTC AFNZV AFYHH AFZLO AHMHQ AJEBP ALMA_UNASSIGNED_HOLDINGS AODMV ARAPS ASMFL ATGMP AUCOK AZQEC BENPR BGLVJ BPHCQ CCPQU CS3 DWQXO ECCUG FNNZZ GEI GNUQQ GQ. H13 HCIFZ HZ~ IPNFZ J1Y JL0 JQ2 K6V K7- KBGRL L7M L~C L~D M0N M42 O9- P2P P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PROAC Q3A Q9U RIG SBBZN TDQ TGG TMD TMF Z11 Z12 |
ID | FETCH-LOGICAL-c268t-c7ab259e2de8f747beddf32e3fb0dd1e1e672850bbcb2255e22e5176a05769b83 |
IEDL.DBID | BENPR |
ISSN | 1742-7371 |
IngestDate | Fri Jul 25 22:52:54 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c268t-c7ab259e2de8f747beddf32e3fb0dd1e1e672850bbcb2255e22e5176a05769b83 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 3125892869 |
PQPubID | 1006422 |
PageCount | 14 |
ParticipantIDs | proquest_journals_3125892869 |
PublicationCentury | 2000 |
PublicationDate | 2024-11-12 |
PublicationDateYYYYMMDD | 2024-11-12 |
PublicationDate_xml | – month: 11 year: 2024 text: 2024-11-12 day: 12 |
PublicationDecade | 2020 |
PublicationPlace | Bingley |
PublicationPlace_xml | – name: Bingley |
PublicationTitle | International journal of pervasive computing and communications |
PublicationYear | 2024 |
Publisher | Emerald Group Publishing Limited |
Publisher_xml | – name: Emerald Group Publishing Limited |
SSID | ssib007298725 ssj0068318 |
Score | 2.319143 |
Snippet | PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an... |
SourceID | proquest |
SourceType | Aggregation Database |
StartPage | 593 |
SubjectTerms | Access control Algorithms Cloud computing Completion time Confidentiality Constraints Control systems Cryptography Data encryption Data storage Data transmission Datasets Encryption Internet of Things Number systems Residue number systems Social networks Time measurement |
Title | Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data |
URI | https://www.proquest.com/docview/3125892869 |
Volume | 20 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NS8MwFA9uu3jxW_yYIwevYW2SpslJdGzOgWOIgx2E0eSlKEg3t-7gf2_SZu4gCO2p9JL39Xsv7_ceQre5kSpNOCMCgBKunSlmmeIEQAGkEQcqPFH4eSyGUz6aJbNQcFuHtsqtT6wcNSyMr5F3mYvEUlEp1N3yi_itUf52NazQaKCWc8FSNlHroT-evPxqlIOOMt1N3xOyrvg5GO5wJUvjLY0mkt2n0aTX801A1De4u5f9cc9VzBkcoYMAFvF9Ld1jtGeLE3S4XcSAg12eord-8V7d5GPz4ccEYN_OQZbVyF-clfVSK0t8xALsfll9V44CZwXgWgUDGxO7p-KSYPO52AD2_aNnaDrov_aGJKxNIIYKWRKTZtolNZaClbnLFrQFyBm1LNcRQGxjK1Iqk0hro501J5ZSm8SpyBx0E0pLdo6axaKwFwhD6nJtIXItjeLAWcZ0xlSkPC6yudSXqL09oXnQ_fV8J6mr_z9fo3131twz-2LaRs1ytbE3LsSXuoMacvDYCdL8AfArpzM |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwELVYDnBhRywFfICjRWI7jn1ACBVKy1JxAIkDUokzjkBCaWmLUH-Kb2SchR6QuCElpyg52M8zz857M4QcZqk2cSQFUwCcSYtLMUmMZAAGIA4kcOWNwrdd1X6QV4_R4wz5qr0wXlZZx8QiUEM_9WfkxwIzsTZcK3M6eGe-a5T_u1q30Chhce0mn7hlG510znF-jzhvXdw326zqKsBSrvSYpXFikfM7Dk5nSKatA8gEdyKzAUDoQqdirqPA2tQi2CPHuYvCWCXIbJSxWuB3Z8m8FJjJvTO9dfmDXySqOp7W-lO6PF9E0o8sVsRhbdoJ9HHn6q7Z9JIj7uX0eItfyaDIcK0VslRRU3pWYmmVzLh8jSzXbR9oFQXWydNF_lLoBmj66osSUC8eYYOiwDBNxmULLcd8fgSKrwwnRViiSQ60BHzl_aR4Fc4Vmr71P4B6teoGefiX4dwkc3k_d1uEQow7e6Uyq1MjQYpE2ESYwHgW5jJtt0mjHqFetdJGvSkudv5-fEAW2ve3N72bTvd6lyziuEvvKQx5g8yNhx9uD8nF2O4XM0rJ839D6Bvo2eK7 |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NT9tAEB1BkCouhUIRLdDuAY6r2Lv2fhwQKiERgRJFqEgcKgWvZy2QkJOGIMRf49d11h9wqNQbkn2y7MPs25k363kzAPtFbqxOE8kVouCJo62YZTbhiBZRRwkKFYTCFyN1epWcXafXS_DSamFCWWXrEytHjdM8nJF3JUViY4VRtls0ZRHjk8HR7A8PE6TCn9Z2nEYNkXP__ETp28Ph8ITW-kCIQf9X75Q3EwZ4LpRZ8Fxnjvi_F-hNQcTaecRCCi8LFyHGPvZKC5NGzuWOgJ96IXwaa5URy1HWGUnfXYYVHbKiDqwc90fjy1c0E201-q3znzL1aSOlAMRppY5bCU9kusOzca8XCpBEKK6nW_4TGqp4N1iHjw1RZT9qZH2CJV9uwFo7BII1PmETfvfL26qKgOV3oUUBCzbjs6rdMMsW9UAtz0O0REavzJ8rJ8WyElkN_0YJyuiqdCwsv58-Igu1q5_h6l0MugWdclr6bWCoKc9XqnAmtwkmMpMukzaygZP5wrgvsNtaaNLsu4fJG0q-_v_xd_hA8Jn8HI7Od2CVzJ4EgWEsdqGzmD_6PWIaC_etWVIGN--Nor_4SOhN |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Enhanced+cipher+text-policy+attribute-based+encryption+and+serialization+on+media+cloud+data&rft.jtitle=International+journal+of+pervasive+computing+and+communications&rft.au=Mohan%2C+Naik+R&rft.au=H+Manoj+T+Gadiyar&rft.au=Sharath%2C+S+M&rft.au=Bharathrajkumar%2C+M&rft.date=2024-11-12&rft.pub=Emerald+Group+Publishing+Limited&rft.issn=1742-7371&rft.eissn=1742-738X&rft.volume=20&rft.issue=5&rft.spage=593&rft.epage=606&rft_id=info:doi/10.1108%2FIJPCC-06-2022-0223&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1742-7371&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1742-7371&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1742-7371&client=summon |