Skip to main content
Log in

Securing cloud access with enhanced attribute-based cryptography

  • Regular Paper
  • Published:
Computing Aims and scope Submit manuscript

Abstract

With technological advancements and increasing globalization, cloud computing has emerged as one of the most favoured environments for managing and maintaining data, information, and services worldwide. However, this widespread use of cloud computing necessitates addressing various security challenges and implementing adequate provisions for ensuring data confidentiality and privacy. This paper proposes a modified model to address the above challenges. An improved access control system utilizing attribute-based encryption (ABE) has been proposed for secure cloud access. In this system, the message is broadcasted by the owner, and only precise users possessing definite attributes and constraints are authorized to access shared data. The encryption is carried out on the basis of attributes of the users, and each user’s secret share is generated based on their given identity information. The distributed hash table (DHT) is used to distribute ciphertext share and decryption key. The authorized users can receive the disseminated ciphertext only by utilizing their secret shares and the required attributes. The proposed model has been experimentally evaluated and compared with existing state-of-the-art systems, demonstrating its effectiveness and superiority. Additionally, the model incorporates extra features such as a time limit for data availability, biometrics-based identity verification, and resistance to various attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Rastogi G, Sushil R (2015) Cloud computing security and homomorphic encryption. IUP J Comput Sci 9(3):48–58

    Google Scholar 

  2. Guo L, Zheng X, Ding C, Mu D, Li Z (2015) Cloud service recommendation: State of the art and research challenges. In 2015 15th IEEE/ACM international symposium on cluster, cloud and grid computing (pp 761–764). IEEE

  3. Rastogi G, Sushil R (2016) Performance analysis of live and offline vm migration using kvm. Int J Mod Educ Comput Sci 8(11):50

    Article  Google Scholar 

  4. Arora PR, Verma G (2011) Implementation of authentication and transaction security based on Kerberos. IJITCE, 7

  5. Verma G, Adhikari S (2020) Cloud computing security issues: a Stakeholder’s perspective. SN Comput Sci 1(6):1–8

    Article  Google Scholar 

  6. He H, Zheng LH, Li P, Deng L, Huang L, Chen X (2020) An efficient attribute-based hierarchical data access control scheme in cloud computing. HCIS 10(1):1–9

    Article  Google Scholar 

  7. Kumar P, Alphonse PJ (2018) Attribute based encryption in cloud computing: a survey, gap analysis, and future directions. J Netw Comput Appl 15(108):37–52

    Google Scholar 

  8. Servos D, Osborn SL (2017) Current research and open problems in attribute-based access control. ACM Comput Surv (CSUR) 49(4):1–45

    Article  Google Scholar 

  9. Verma G, Chakraborty R (2019) A hybrid privacy preserving scheme using finger print detection in cloud environment. Ing´enierie des Syst`emes d Inf. 24(3):343–351

    Google Scholar 

  10. Rastogi G, Sushil R (2018) Secured identity management system for preserving data privacy andtransmission in cloud computing. Int J Futur Gener Commun Netw 11(1):23–36

    Google Scholar 

  11. Geambasu R, Kohno T, Levy AA, Levy HM, (2009) Vanish: increasing data privacy with self-destructing data. In USENIX security symposium, Vol 316

  12. Yue F, Wang G, Liu Q, 2010 A secure self-destructing scheme for electronic data. In 2010 IEEE/IFIP international conference on embedded and ubiquitous computing pp 651658. IEEE

  13. Li J, Wang Y, Zhang Y, Han J (2017) Full verifiability for outsourced decryption in attribute-based encryption. IEEE Trans Serv Comput 13(3):478–487

    Article  Google Scholar 

  14. Sicari S, Rizzardi A, Dini G, Perazzo P, La Manna M, Coen-Porisini A (2021) Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware. Int J Inf Secur 20(5):695–713

    Article  Google Scholar 

  15. Sahai A, Waters B, (2005) Fuzzy identity-based encryption. In annual international conference on the theory and applications of cryptographic techniques, pp 457–473. Springer, Berlin, Heidelberg

  16. Frikken K, Atallah M, Li J (2006) Attribute-based access control with hidden policies and hidden credentials. IEEE Trans Comput 55(10):1259–1270

    Article  Google Scholar 

  17. Yu S, Ren K, Lou W, (2008) Attribute-based content distribution with hidden policy. In 2008 4th workshop on secure network protocols pp. 39–44. IEEE

  18. Chase M (2007) Multi-authority attribute based encryption. In theory of cryptography conference pp 515–534. Springer, Berlin, Heidelberg

  19. Rivest RL, Shamir A, Wagner DA (1996) Time-lock puzzles and timed-release crypto

  20. Xiong H, Zhao Y, Peng L, Zhang H, Yeh KH (2019) Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Futur Gener Comput Syst 97:453–461

    Article  Google Scholar 

  21. Ruj S (2014) Attribute based access control in clouds: a survey. In 2014 international conference on signal processing and communications (SPCOM) pp 1–6. IEEE

  22. Namasudra S (2019) An improved attribute-based encryption technique towards the data security in cloud computing. Concurr Comput Pract Exp 31(3):e4364

    Article  Google Scholar 

  23. Verma G (2022) Secure VM migration in cloud: multi-criteria perspective with improved optimization model. Wireless Pers Commun 124:1–28

    Article  Google Scholar 

  24. Zhang X, Wang H, Xu C (2019) Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Inf Sci 472:223–234

    Article  MATH  Google Scholar 

  25. Chervyakov N, Babenko M, Tchernykh A, Kucherov N (2019) Miranda-Lo´pez V, Cort´es Mendoza JM, AR-RRNS: configurable reliable distributed data storage systems for Internet of Things to ensure security. Futur Gener Comput Syst 92:1080–1092

    Article  Google Scholar 

  26. Li J, Yu Q, Zhang Y (2019) Hierarchical attribute based encryption with continuous leakage resilience. Inf Sci 484:113–134

    Article  MATH  Google Scholar 

  27. Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput Electr Eng 39(1):34–46

    Article  Google Scholar 

  28. Maymounkov P, Mazieres D, Kademlia (2002) A peer-to-peer information system based on the xor metric. In international workshop on peer-to-peer systems pp 53–65, Springer, Berlin, Heidelberg

  29. Rowstron A, Druschel P, Pastry (2001) Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, In IFIP/ACM international conference on distributed systems platforms and open distributed processing pp 329–350. Springer, Berlin, Heidelberg

  30. Stoica I, Morris R, Karger D, Kaashoek MF, Bala krishnan H, Chord A (2001) A scalable peer-to peer lookup service for internet applications. ACM SIGCOMM Comput Commun Rev 31(4):149–160

    Article  Google Scholar 

  31. Verma G, Pathak N, Sharma N (2021) A secure framework for health record management using blockchain in cloud environment. J Phys Conf Ser 1998(1):012019

    Article  Google Scholar 

Download references

Funding

We hereby declare that no funds, grants, or other support were received during the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Garima Verma.

Ethics declarations

Conflict of interest

The authors have no relevant financial or non-financial interests to disclose.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, A., Verma, G. Securing cloud access with enhanced attribute-based cryptography. Computing (2023). https://doi.org/10.1007/s00607-023-01212-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00607-023-01212-7

Keywords

Mathematics Subject Classifications

Navigation