Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data

PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribut...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of pervasive computing and communications Vol. 20; no. 5; pp. 593 - 606
Main Authors Mohan, Naik R, H Manoj T Gadiyar, Sharath, S M, Bharathrajkumar, M, Sowmya, T K
Format Journal Article
LanguageEnglish
Published Bingley Emerald Group Publishing Limited 12.11.2024
Subjects
Online AccessGet full text

Cover

Loading…
Abstract PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.
AbstractList PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.
Author Sowmya, T K
Bharathrajkumar, M
Sharath, S M
H Manoj T Gadiyar
Mohan, Naik R
Author_xml – sequence: 1
  givenname: Naik
  surname: Mohan
  middlename: R
  fullname: Mohan, Naik R
– sequence: 2
  fullname: H Manoj T Gadiyar
– sequence: 3
  givenname: S
  surname: Sharath
  middlename: M
  fullname: Sharath, S M
– sequence: 4
  givenname: M
  surname: Bharathrajkumar
  fullname: Bharathrajkumar, M
– sequence: 5
  givenname: T
  surname: Sowmya
  middlename: K
  fullname: Sowmya, T K
BookMark eNo9TV9LwzAcDDLBOfcFfAr4HE1-WZr0UcrUyUAfFHwQRv78yiI1rW0Kzk9vURHuuOM47k7JLLUJCTkX_FIIbq42949VxXjBgAOwifKIzIVeAdPSvMz-vRYnZDkM0XGuoTQa1Jy8rtPeJo-B-tjtsacZPzPr2ib6A7U599GNGZmzw1TB5PtDl2ObqE2BDthH28Qv-5NMeMcQLfVNOwYabLZn5Li2zYDLP12Q55v1U3XHtg-3m-p6yzwUJjOvrQNVIgQ0tV5phyHUElDWjocgUGChwSjunHcASiEAKqELy5UuSmfkglz87nZ9-zHikHdv7din6XInBShTgilK-Q298ln-
ContentType Journal Article
Copyright Emerald Publishing Limited.
Copyright_xml – notice: Emerald Publishing Limited.
DBID 7SC
7SP
7XB
8FD
8FE
8FG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.1108/IJPCC-06-2022-0223
DatabaseName Computer and Information Systems Abstracts
Electronics & Communications Abstracts
ProQuest Central (purchase pre-March 2016)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Database
ProQuest Central Essentials
ProQuest Central (New)
Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Computer Science Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1742-738X
EndPage 606
GroupedDBID 0R~
29J
3FY
4.4
5VS
70U
7SC
7SP
7XB
8FD
8FE
8FG
AAGBP
AAMCF
AAPSD
AATHL
AAUDR
ABIJV
ABJNI
ABKQV
ABSDC
ABYQI
ACGFS
ACZLT
ADOMW
AEBZA
AFKRA
AFNTC
AFNZV
AFYHH
AFZLO
AHMHQ
AJEBP
ALMA_UNASSIGNED_HOLDINGS
AODMV
ARAPS
ASMFL
ATGMP
AUCOK
AZQEC
BENPR
BGLVJ
BPHCQ
CCPQU
CS3
DWQXO
ECCUG
FNNZZ
GEI
GNUQQ
GQ.
H13
HCIFZ
HZ~
IPNFZ
J1Y
JL0
JQ2
K6V
K7-
KBGRL
L7M
L~C
L~D
M0N
M42
O9-
P2P
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PROAC
Q3A
Q9U
RIG
SBBZN
TDQ
TGG
TMD
TMF
Z11
Z12
ID FETCH-LOGICAL-c268t-c7ab259e2de8f747beddf32e3fb0dd1e1e672850bbcb2255e22e5176a05769b83
IEDL.DBID BENPR
ISSN 1742-7371
IngestDate Fri Jul 25 22:52:54 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 5
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c268t-c7ab259e2de8f747beddf32e3fb0dd1e1e672850bbcb2255e22e5176a05769b83
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 3125892869
PQPubID 1006422
PageCount 14
ParticipantIDs proquest_journals_3125892869
PublicationCentury 2000
PublicationDate 2024-11-12
PublicationDateYYYYMMDD 2024-11-12
PublicationDate_xml – month: 11
  year: 2024
  text: 2024-11-12
  day: 12
PublicationDecade 2020
PublicationPlace Bingley
PublicationPlace_xml – name: Bingley
PublicationTitle International journal of pervasive computing and communications
PublicationYear 2024
Publisher Emerald Group Publishing Limited
Publisher_xml – name: Emerald Group Publishing Limited
SSID ssib007298725
ssj0068318
Score 2.319143
Snippet PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an...
SourceID proquest
SourceType Aggregation Database
StartPage 593
SubjectTerms Access control
Algorithms
Cloud computing
Completion time
Confidentiality
Constraints
Control systems
Cryptography
Data encryption
Data storage
Data transmission
Datasets
Encryption
Internet of Things
Number systems
Residue number systems
Social networks
Time measurement
Title Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data
URI https://www.proquest.com/docview/3125892869
Volume 20
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NS8MwFA9uu3jxW_yYIwevYW2SpslJdGzOgWOIgx2E0eSlKEg3t-7gf2_SZu4gCO2p9JL39Xsv7_ceQre5kSpNOCMCgBKunSlmmeIEQAGkEQcqPFH4eSyGUz6aJbNQcFuHtsqtT6wcNSyMr5F3mYvEUlEp1N3yi_itUf52NazQaKCWc8FSNlHroT-evPxqlIOOMt1N3xOyrvg5GO5wJUvjLY0mkt2n0aTX801A1De4u5f9cc9VzBkcoYMAFvF9Ld1jtGeLE3S4XcSAg12eord-8V7d5GPz4ccEYN_OQZbVyF-clfVSK0t8xALsfll9V44CZwXgWgUDGxO7p-KSYPO52AD2_aNnaDrov_aGJKxNIIYKWRKTZtolNZaClbnLFrQFyBm1LNcRQGxjK1Iqk0hro501J5ZSm8SpyBx0E0pLdo6axaKwFwhD6nJtIXItjeLAWcZ0xlSkPC6yudSXqL09oXnQ_fV8J6mr_z9fo3131twz-2LaRs1ytbE3LsSXuoMacvDYCdL8AfArpzM
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwELVYDnBhRywFfICjRWI7jn1ACBVKy1JxAIkDUokzjkBCaWmLUH-Kb2SchR6QuCElpyg52M8zz857M4QcZqk2cSQFUwCcSYtLMUmMZAAGIA4kcOWNwrdd1X6QV4_R4wz5qr0wXlZZx8QiUEM_9WfkxwIzsTZcK3M6eGe-a5T_u1q30Chhce0mn7hlG510znF-jzhvXdw326zqKsBSrvSYpXFikfM7Dk5nSKatA8gEdyKzAUDoQqdirqPA2tQi2CPHuYvCWCXIbJSxWuB3Z8m8FJjJvTO9dfmDXySqOp7W-lO6PF9E0o8sVsRhbdoJ9HHn6q7Z9JIj7uX0eItfyaDIcK0VslRRU3pWYmmVzLh8jSzXbR9oFQXWydNF_lLoBmj66osSUC8eYYOiwDBNxmULLcd8fgSKrwwnRViiSQ60BHzl_aR4Fc4Vmr71P4B6teoGefiX4dwkc3k_d1uEQow7e6Uyq1MjQYpE2ESYwHgW5jJtt0mjHqFetdJGvSkudv5-fEAW2ve3N72bTvd6lyziuEvvKQx5g8yNhx9uD8nF2O4XM0rJ839D6Bvo2eK7
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NT9tAEB1BkCouhUIRLdDuAY6r2Lv2fhwQKiERgRJFqEgcKgWvZy2QkJOGIMRf49d11h9wqNQbkn2y7MPs25k363kzAPtFbqxOE8kVouCJo62YZTbhiBZRRwkKFYTCFyN1epWcXafXS_DSamFCWWXrEytHjdM8nJF3JUViY4VRtls0ZRHjk8HR7A8PE6TCn9Z2nEYNkXP__ETp28Ph8ITW-kCIQf9X75Q3EwZ4LpRZ8Fxnjvi_F-hNQcTaecRCCi8LFyHGPvZKC5NGzuWOgJ96IXwaa5URy1HWGUnfXYYVHbKiDqwc90fjy1c0E201-q3znzL1aSOlAMRppY5bCU9kusOzca8XCpBEKK6nW_4TGqp4N1iHjw1RZT9qZH2CJV9uwFo7BII1PmETfvfL26qKgOV3oUUBCzbjs6rdMMsW9UAtz0O0REavzJ8rJ8WyElkN_0YJyuiqdCwsv58-Igu1q5_h6l0MugWdclr6bWCoKc9XqnAmtwkmMpMukzaygZP5wrgvsNtaaNLsu4fJG0q-_v_xd_hA8Jn8HI7Od2CVzJ4EgWEsdqGzmD_6PWIaC_etWVIGN--Nor_4SOhN
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Enhanced+cipher+text-policy+attribute-based+encryption+and+serialization+on+media+cloud+data&rft.jtitle=International+journal+of+pervasive+computing+and+communications&rft.au=Mohan%2C+Naik+R&rft.au=H+Manoj+T+Gadiyar&rft.au=Sharath%2C+S+M&rft.au=Bharathrajkumar%2C+M&rft.date=2024-11-12&rft.pub=Emerald+Group+Publishing+Limited&rft.issn=1742-7371&rft.eissn=1742-738X&rft.volume=20&rft.issue=5&rft.spage=593&rft.epage=606&rft_id=info:doi/10.1108%2FIJPCC-06-2022-0223&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1742-7371&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1742-7371&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1742-7371&client=summon