HAP-BB: Hidden Access Policy-Based Cloud Data Sharing with Block Design and Blockchain Methodology

Authors

  • A. C. Ashmita, C. Yamini

Keywords:

Block design, Block Chain, Cloud data sharing, CP-ABE, HAP-ABE

Abstract

Policy on Ciphertext Attribute-based One of the best ways to manage who may access what data in the cloud is via encryption (CP-ABE). Key management becomes much easier when multiple users' attributes are taken into account while accessing shared data. The inability to safeguard policy data is a major issue with CP-ABE. In addition, data owners would incur prohibitive communication and computation costs due to the need to re-encrypt and transfer fresh data back to the cloud if data is often modified. A framework for accessing and exchanging data in the cloud, the HAP-BB, was suggested in this paper. Three approaches have been used in the HAP-BB architecture. A first method is HAP-ABE (Hidden Access-Policy Attribute-Based Encryption), which encrypts plaintext and communicates it with the ciphertext using an access policy. Critical information concealed from unreliable parties or system users in a real-world system's policies. The HAP-ABE access control system has a severe data limitation due to hidden features with Boolean architecture. The second one is blocked design-based key agreement protocol.Finally, we focused on blockchain-with intrusion detection and firewall security through a study on cloud storage administration models and blockchain innovation. The experimental results are compared with various existing methods.

Downloads

Download data is not yet available.

References

Anjali, R. S., & Ravikumar, A. (2016). Preserving privacy in public auditing for shared cloud data. 2016 International Conference on Inventive Computation Technologies (ICICT). doi:10.1109/inventive.2016.7824838

Chandanapriya, E., & Murali, G. (2016). Effective data sharing using advanced ring signature with forward security. 2016 International Conference on Communication and Electronics Systems (ICCES). doi:10.1109/cesys.2016.7889937

Dhivya V., Anandakumar H, & Sivakumar M. (2015). An effective group formation in the cloud based on Ring signature. 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO). doi:10.1109/isco.2015.7282366

Nishide, T., Yoneyama, K., and Ohta, K., 2008. Attributebased encryption with partially hidden encryptorspecified access structures. In Proceedings of Applied Cryptography and Network Security, ACNS'08. LCNS, Vol.5037, pages 111-129. Springer.

Katz, J., Sahai, A., and Waters, B., 2008. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2008. LNCS, Vol 4965. pages 146-162, Springer.

Lai, J., Deng, R. H., and Li, Y., 2011. Fully Secure Cipertext-Policy Hiding CP-ABE, In Proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC'11, pages 24- 39, Springer.

Zhao, F., Nishide, T., and Sakurai, K., 2011. Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems, In Proceedings of 7th International Conference of Information Security Practice and Experience, ISPEC'11, papges 83-97, Springer.

Ruj, S., Stojmenovic, M., and Nayak, A., 2012. Privacy Preserving Access Control with Authentication for Securing Data in Clouds, In Proceedings of 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012, pages 556-563, IEEE.

Li, M., Yu, S., Zheng, Y., Ren, K, and Lou, W., 2012. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption, In IEEE Transactions on Parallel and Distributed Systems. Volume 24, Issue: 1, pages 131-143, IEEE

Fugkeaw, S. and H. Sato, 2015. An extended CP-ABE based Access control model for data outsourced in the cloud, In Proceedings of IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking, MidCCI 2015, IEEE.

B. Waters and A. Sahai "Fuzzy identity-based encryption" Proc. 24th Annu. Int. Conf. Theory Appl. Cryptograph. Techn., pp. 457-473, 2005

O. Pandey, V. Goyal, B. Waters, and A. Sahai. "Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data," Proc. 13th ACM Conf. Computer and Comm. Security (CCS' 06), pp. 89-98, 2006

A. Sahai, B. Waters and J. Bethencourt "Ciphertext-policy attribute-based encryption" Proc. IEEE Symp. Secure. Privacy, pp. 321-334, May 2007

S. S. M. Chow and M. Chase "Improving privacy and security in multi-authority attribute-based encryption" Proc. 16th ACM Conf. Comput. Commun. Secur., pp. 121-130, 2009.

J. Hur "Improving security and efficiency in attribute-based data sharing" IEEE Trans. Knowl. Data Eng., vol. 25, no. 10, pp. 2271-2282, Oct. 2013

X. Chen, X. Xie, H. Ma and J. Li "An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing" J. Universal Comput. Sci., vol. 19, no. 16, pp. 2349-2367, Oct. 2013

S. Katzenbeisser, S. Müller, and C. Eckert, "Distributed attribute-based encryption," in Proc. 11th Int.Conf. Inf. Secure Cryptol, pp.20– 36, 2009.

C.-I. Fan, H.-M. Ruan and V. S.-M. Huang "Arbitrary-state attribute-based encryption with dynamic membership" IEEE Trans. Comput., vol. 63, no. 8, pp. 1951-1961, Aug. 2014

Yang, Z., Wang, Z., Qiu, F., & Li, F. (2023). A group key agreement protocol based on ecdh and short signature. Journal of Information Security and Applications, 72, 103388.

Zhou, T., Wang, C., Zheng, W., & Tan, H. (2023). Secure and efficient authenticated group key agreement protocol for AI-based automation systems. ISA transactions.

Downloads

Published

30.08.2023

How to Cite

A. C. Ashmita. (2023). HAP-BB: Hidden Access Policy-Based Cloud Data Sharing with Block Design and Blockchain Methodology. International Journal of Intelligent Systems and Applications in Engineering, 11(11s), 538 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/7068

Issue

Section

Research Article