Abstract
With technological advancements and increasing globalization, cloud computing has emerged as one of the most favoured environments for managing and maintaining data, information, and services worldwide. However, this widespread use of cloud computing necessitates addressing various security challenges and implementing adequate provisions for ensuring data confidentiality and privacy. This paper proposes a modified model to address the above challenges. An improved access control system utilizing attribute-based encryption (ABE) has been proposed for secure cloud access. In this system, the message is broadcasted by the owner, and only precise users possessing definite attributes and constraints are authorized to access shared data. The encryption is carried out on the basis of attributes of the users, and each user’s secret share is generated based on their given identity information. The distributed hash table (DHT) is used to distribute ciphertext share and decryption key. The authorized users can receive the disseminated ciphertext only by utilizing their secret shares and the required attributes. The proposed model has been experimentally evaluated and compared with existing state-of-the-art systems, demonstrating its effectiveness and superiority. Additionally, the model incorporates extra features such as a time limit for data availability, biometrics-based identity verification, and resistance to various attacks.








Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Rastogi G, Sushil R (2015) Cloud computing security and homomorphic encryption. IUP J Comput Sci 9(3):48–58
Guo L, Zheng X, Ding C, Mu D, Li Z (2015) Cloud service recommendation: State of the art and research challenges. In 2015 15th IEEE/ACM international symposium on cluster, cloud and grid computing (pp 761–764). IEEE
Rastogi G, Sushil R (2016) Performance analysis of live and offline vm migration using kvm. Int J Mod Educ Comput Sci 8(11):50
Arora PR, Verma G (2011) Implementation of authentication and transaction security based on Kerberos. IJITCE, 7
Verma G, Adhikari S (2020) Cloud computing security issues: a Stakeholder’s perspective. SN Comput Sci 1(6):1–8
He H, Zheng LH, Li P, Deng L, Huang L, Chen X (2020) An efficient attribute-based hierarchical data access control scheme in cloud computing. HCIS 10(1):1–9
Kumar P, Alphonse PJ (2018) Attribute based encryption in cloud computing: a survey, gap analysis, and future directions. J Netw Comput Appl 15(108):37–52
Servos D, Osborn SL (2017) Current research and open problems in attribute-based access control. ACM Comput Surv (CSUR) 49(4):1–45
Verma G, Chakraborty R (2019) A hybrid privacy preserving scheme using finger print detection in cloud environment. Ing´enierie des Syst`emes d Inf. 24(3):343–351
Rastogi G, Sushil R (2018) Secured identity management system for preserving data privacy andtransmission in cloud computing. Int J Futur Gener Commun Netw 11(1):23–36
Geambasu R, Kohno T, Levy AA, Levy HM, (2009) Vanish: increasing data privacy with self-destructing data. In USENIX security symposium, Vol 316
Yue F, Wang G, Liu Q, 2010 A secure self-destructing scheme for electronic data. In 2010 IEEE/IFIP international conference on embedded and ubiquitous computing pp 651658. IEEE
Li J, Wang Y, Zhang Y, Han J (2017) Full verifiability for outsourced decryption in attribute-based encryption. IEEE Trans Serv Comput 13(3):478–487
Sicari S, Rizzardi A, Dini G, Perazzo P, La Manna M, Coen-Porisini A (2021) Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware. Int J Inf Secur 20(5):695–713
Sahai A, Waters B, (2005) Fuzzy identity-based encryption. In annual international conference on the theory and applications of cryptographic techniques, pp 457–473. Springer, Berlin, Heidelberg
Frikken K, Atallah M, Li J (2006) Attribute-based access control with hidden policies and hidden credentials. IEEE Trans Comput 55(10):1259–1270
Yu S, Ren K, Lou W, (2008) Attribute-based content distribution with hidden policy. In 2008 4th workshop on secure network protocols pp. 39–44. IEEE
Chase M (2007) Multi-authority attribute based encryption. In theory of cryptography conference pp 515–534. Springer, Berlin, Heidelberg
Rivest RL, Shamir A, Wagner DA (1996) Time-lock puzzles and timed-release crypto
Xiong H, Zhao Y, Peng L, Zhang H, Yeh KH (2019) Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Futur Gener Comput Syst 97:453–461
Ruj S (2014) Attribute based access control in clouds: a survey. In 2014 international conference on signal processing and communications (SPCOM) pp 1–6. IEEE
Namasudra S (2019) An improved attribute-based encryption technique towards the data security in cloud computing. Concurr Comput Pract Exp 31(3):e4364
Verma G (2022) Secure VM migration in cloud: multi-criteria perspective with improved optimization model. Wireless Pers Commun 124:1–28
Zhang X, Wang H, Xu C (2019) Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Inf Sci 472:223–234
Chervyakov N, Babenko M, Tchernykh A, Kucherov N (2019) Miranda-Lo´pez V, Cort´es Mendoza JM, AR-RRNS: configurable reliable distributed data storage systems for Internet of Things to ensure security. Futur Gener Comput Syst 92:1080–1092
Li J, Yu Q, Zhang Y (2019) Hierarchical attribute based encryption with continuous leakage resilience. Inf Sci 484:113–134
Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput Electr Eng 39(1):34–46
Maymounkov P, Mazieres D, Kademlia (2002) A peer-to-peer information system based on the xor metric. In international workshop on peer-to-peer systems pp 53–65, Springer, Berlin, Heidelberg
Rowstron A, Druschel P, Pastry (2001) Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, In IFIP/ACM international conference on distributed systems platforms and open distributed processing pp 329–350. Springer, Berlin, Heidelberg
Stoica I, Morris R, Karger D, Kaashoek MF, Bala krishnan H, Chord A (2001) A scalable peer-to peer lookup service for internet applications. ACM SIGCOMM Comput Commun Rev 31(4):149–160
Verma G, Pathak N, Sharma N (2021) A secure framework for health record management using blockchain in cloud environment. J Phys Conf Ser 1998(1):012019
Funding
We hereby declare that no funds, grants, or other support were received during the preparation of this manuscript.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no relevant financial or non-financial interests to disclose.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kumar, A., Verma, G. Securing cloud access with enhanced attribute-based cryptography. Computing 106, 4193–4207 (2024). https://doi.org/10.1007/s00607-023-01212-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00607-023-01212-7