HAP-BB: Hidden Access Policy-Based Cloud Data Sharing with Block Design and Blockchain Methodology
Keywords:
Block design, Block Chain, Cloud data sharing, CP-ABE, HAP-ABEAbstract
Policy on Ciphertext Attribute-based One of the best ways to manage who may access what data in the cloud is via encryption (CP-ABE). Key management becomes much easier when multiple users' attributes are taken into account while accessing shared data. The inability to safeguard policy data is a major issue with CP-ABE. In addition, data owners would incur prohibitive communication and computation costs due to the need to re-encrypt and transfer fresh data back to the cloud if data is often modified. A framework for accessing and exchanging data in the cloud, the HAP-BB, was suggested in this paper. Three approaches have been used in the HAP-BB architecture. A first method is HAP-ABE (Hidden Access-Policy Attribute-Based Encryption), which encrypts plaintext and communicates it with the ciphertext using an access policy. Critical information concealed from unreliable parties or system users in a real-world system's policies. The HAP-ABE access control system has a severe data limitation due to hidden features with Boolean architecture. The second one is blocked design-based key agreement protocol.Finally, we focused on blockchain-with intrusion detection and firewall security through a study on cloud storage administration models and blockchain innovation. The experimental results are compared with various existing methods.
Downloads
References
Anjali, R. S., & Ravikumar, A. (2016). Preserving privacy in public auditing for shared cloud data. 2016 International Conference on Inventive Computation Technologies (ICICT). doi:10.1109/inventive.2016.7824838
Chandanapriya, E., & Murali, G. (2016). Effective data sharing using advanced ring signature with forward security. 2016 International Conference on Communication and Electronics Systems (ICCES). doi:10.1109/cesys.2016.7889937
Dhivya V., Anandakumar H, & Sivakumar M. (2015). An effective group formation in the cloud based on Ring signature. 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO). doi:10.1109/isco.2015.7282366
Nishide, T., Yoneyama, K., and Ohta, K., 2008. Attributebased encryption with partially hidden encryptorspecified access structures. In Proceedings of Applied Cryptography and Network Security, ACNS'08. LCNS, Vol.5037, pages 111-129. Springer.
Katz, J., Sahai, A., and Waters, B., 2008. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2008. LNCS, Vol 4965. pages 146-162, Springer.
Lai, J., Deng, R. H., and Li, Y., 2011. Fully Secure Cipertext-Policy Hiding CP-ABE, In Proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC'11, pages 24- 39, Springer.
Zhao, F., Nishide, T., and Sakurai, K., 2011. Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems, In Proceedings of 7th International Conference of Information Security Practice and Experience, ISPEC'11, papges 83-97, Springer.
Ruj, S., Stojmenovic, M., and Nayak, A., 2012. Privacy Preserving Access Control with Authentication for Securing Data in Clouds, In Proceedings of 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012, pages 556-563, IEEE.
Li, M., Yu, S., Zheng, Y., Ren, K, and Lou, W., 2012. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption, In IEEE Transactions on Parallel and Distributed Systems. Volume 24, Issue: 1, pages 131-143, IEEE
Fugkeaw, S. and H. Sato, 2015. An extended CP-ABE based Access control model for data outsourced in the cloud, In Proceedings of IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking, MidCCI 2015, IEEE.
B. Waters and A. Sahai "Fuzzy identity-based encryption" Proc. 24th Annu. Int. Conf. Theory Appl. Cryptograph. Techn., pp. 457-473, 2005
O. Pandey, V. Goyal, B. Waters, and A. Sahai. "Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data," Proc. 13th ACM Conf. Computer and Comm. Security (CCS' 06), pp. 89-98, 2006
A. Sahai, B. Waters and J. Bethencourt "Ciphertext-policy attribute-based encryption" Proc. IEEE Symp. Secure. Privacy, pp. 321-334, May 2007
S. S. M. Chow and M. Chase "Improving privacy and security in multi-authority attribute-based encryption" Proc. 16th ACM Conf. Comput. Commun. Secur., pp. 121-130, 2009.
J. Hur "Improving security and efficiency in attribute-based data sharing" IEEE Trans. Knowl. Data Eng., vol. 25, no. 10, pp. 2271-2282, Oct. 2013
X. Chen, X. Xie, H. Ma and J. Li "An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing" J. Universal Comput. Sci., vol. 19, no. 16, pp. 2349-2367, Oct. 2013
S. Katzenbeisser, S. Müller, and C. Eckert, "Distributed attribute-based encryption," in Proc. 11th Int.Conf. Inf. Secure Cryptol, pp.20– 36, 2009.
C.-I. Fan, H.-M. Ruan and V. S.-M. Huang "Arbitrary-state attribute-based encryption with dynamic membership" IEEE Trans. Comput., vol. 63, no. 8, pp. 1951-1961, Aug. 2014
Yang, Z., Wang, Z., Qiu, F., & Li, F. (2023). A group key agreement protocol based on ecdh and short signature. Journal of Information Security and Applications, 72, 103388.
Zhou, T., Wang, C., Zheng, W., & Tan, H. (2023). Secure and efficient authenticated group key agreement protocol for AI-based automation systems. ISA transactions.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.