Ciphertext-Policy Attribute-Based Encryption for Cloud Storage: Toward Data Privacy and Authentication in AI-Enabled IoT System
P. Chinnasamy,
P. Deepalakshmi,
Ashit Kumar Dutta,
Jinsang You and
Gyanendra Prasad Joshi
Additional contact information
P. Chinnasamy: Department of Computer Science and Engineering, MLR Institute of Technology, Hyderabad 500043, India
P. Deepalakshmi: Department of Computer Science and Engineering, Kalasalingam Academy of Research and Education, Srivilliputtur 626128, India
Ashit Kumar Dutta: Department of Computer Science and Information Systems, College of Applied Sciences, AlMaarefa University, Ad Diriyah, Riyadh 13713, Saudi Arabia
Jinsang You: Seculayer Company, Ltd., Seoul 04784, Korea
Gyanendra Prasad Joshi: Department of Computer Science and Engineering, Sejong University, Seoul 05006, Korea
Mathematics, 2021, vol. 10, issue 1, 1-24
Abstract:
People can store their data on servers in cloud computing and allow public users to access data via data centers. One of the most difficult tasks is to provide security for the access policy of data, which is also needed to be stored at cloud servers. The access structure (policy) itself may reveal partial information about what the ciphertext contains. To provide security for the access policy of data, a number of encryption schemes are available. Among these, CP-ABE (Ciphertext-Policy Attribute-Based Encryption) scheme is very significant because it helps to protect, broadcast, and control the access of information. The access policy that is sent as plaintext in the existing CP-ABE scheme along with a ciphertext may leak user privacy and data privacy. To resolve this problem, we hereby introduce a new technique, which hides the access policy using a hashing algorithm and provides security against insider attack using a signature verification scheme. The proposed system is compared with existing CP-ABE schemes in terms of computation and expressive policies. In addition, we can test the functioning of any access control that could be implemented in the Internet of Things (IoT). Additionally, security against indistinguishable adaptive chosen ciphertext attacks is also analyzed for the proposed work.
Keywords: artificial intelligence; CP-ABE; chosen ciphertext attack; fine-grained access control; hiding access policy; SHA1 (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2021
References: View complete reference list from CitEc
Citations: View citations in EconPapers (2)
Downloads: (external link)
https://www.mdpi.com/2227-7390/10/1/68/pdf (application/pdf)
https://www.mdpi.com/2227-7390/10/1/68/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:10:y:2021:i:1:p:68-:d:711413
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().