Abstract

Cloud computing technology has revolutionized the field of data management as it has enhanced the barriers of storage restrictions and high-cost establishment for its users. The benefits of the cloud have paved the way for its extensive implementation in large enterprises. However, the data in the cloud have succumbed to various security threats, and its privacy issues remain one of the biggest and topmost concerns for the data owners. Several techniques, such as Attribute-based Encryption (ABE), have been proposed by several researchers to preserve the privacy of the data. However, the issue of security still looms largely over the cloud. In the present work, we introduce the novel encryption model called “Advanced Encryption Standard–Cipher-text-Identity and Attribute-based Encryption” (AES–CP–IDABE) to preserve data privacy along with its access control. In the proposed scheme, the data have been double encrypted initially through the ABE, along with the attributes and the identity of the user. Secondly, the Advanced Encryption Standard (AES) is used to encrypt the encrypted data and provide it to the authorized users. The user access control is established using the digital signature with the help of user ID and security keys. Additionally, the set up includes Denial-of-Service (DoS) detection through IP address monitoring and control. The proposed scheme has also been evaluated for its performance in the communication between the user and the data owner, along with the user’s execution time. From the outcome, it is evident that the proposed scheme was more effective than the existing scheme of ABE over execution, encryption, and decryption time. Additionally, the performance over DoS detection and impact of attribute numbers for the proposed scheme was also studied to prove its effectiveness.

Highlights

  • With the advent of cloud computing technology, the domain of networking with data is on the rise

  • Like any other technology, cloud computing suffers from numerous privacy and security concerns that remain as a hindrance to its complete adoption [2]

  • The interfaces in the cloud were achieved through the Java API for eXtensible Markup Language (XML) web services hosted with the help of Apache

Read more

Summary

Introduction

With the advent of cloud computing technology, the domain of networking with data is on the rise. This technique has been accepted extensively around the world in recent times. The intense evolution and implementation of the cloud environment have happened due to its ability to handle massive data at a minimal cost, along with its flexible access policies. This has caused many public and private enterprises to establish a cloud network for their data management purpose and their users [1]. If the existing problems related to cloud security are not addressed appropriately, the chances are that it might prevent the Information 2020, 11, 372; doi:10.3390/info11080372 www.mdpi.com/journal/information

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.