Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption
Siti Dhalila Mohd Satar,
Masnida Hussin,
Zurina Mohd Hanapi and
Mohamad Afendee Mohamed
Additional contact information
Siti Dhalila Mohd Satar: Department of Communication Technology and Networks, Universiti Putra Malaysia (UPM), Serdang 43400, Selangor, Malaysia
Masnida Hussin: Department of Communication Technology and Networks, Universiti Putra Malaysia (UPM), Serdang 43400, Selangor, Malaysia
Zurina Mohd Hanapi: Department of Communication Technology and Networks, Universiti Putra Malaysia (UPM), Serdang 43400, Selangor, Malaysia
Mohamad Afendee Mohamed: Centre of Computer Science Study, Universiti Sultan Zainal Abidin, Kampus Besut, Besut 22200, Terengganu, Malaysia
Future Internet, 2021, vol. 13, issue 11, 1-18
Abstract:
Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data access while securing Cloud data. The encrypted data are sent to Cloud storage with an access policy defined by the data owner. Only authorized users can decrypt the encrypted data. However, the access policy of the encrypted data is in readable form, which results in privacy leakage. To address this issue, we proposed a reinforcement hiding in access policy over Cloud storage by enhancing the Ciphertext Policy Attribute-based Encryption (CP-ABE) algorithm. Besides the encryption process, the reinforced CP-ABE used logical connective operations to hide the attribute value of data in the access policy. These attributes were converted into scrambled data along with a ciphertext form that provides a better unreadability feature. It means that a two-level concealed tactic is employed to secure data from any unauthorized access during a data transaction. Experimental results revealed that our reinforced CP-ABE had a low computational overhead and consumed low storage costs. Furthermore, a case study on security analysis shows that our approach is secure against a passive attack such as traffic analysis.
Keywords: CP-ABE; fine-grained access control; policy hiding; privacy-preserving (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2021
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1999-5903/13/11/279/pdf (application/pdf)
https://www.mdpi.com/1999-5903/13/11/279/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:13:y:2021:i:11:p:279-:d:669099
Access Statistics for this article
Future Internet is currently edited by Ms. Grace You
More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().