Abstract:
Maintaining a complex access control over the encrypted data represents one of the most challenging processes of cloud computing and IoT (Internet-of-Things). In this pap...Show MoreMetadata
Abstract:
Maintaining a complex access control over the encrypted data represents one of the most challenging processes of cloud computing and IoT (Internet-of-Things). In this paper we will present and discuss a policy approach based on cipher-text policy and attribute-based encryption in such way that we are able to guarantee a high level of complexity for controlling the access over encrypted data, and by providing a personalized verifiable authorization process. This process and scheme will be noted as CCIoT -CP-ABE (Cloud Computing Internet-of-Things Cipher Policy-Attribute-Based Encryption). The main advantage of the proposed scheme is to provide data confidentiality for the encrypted data in case if the server has been compromised. The second advantage of the proposed scheme is that guarantees a high level of security against collusion attacks. The evaluation of the performance is presented as well.
Published in: 2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
Date of Conference: 30 June 2022 - 01 July 2022
Date Added to IEEE Xplore: 15 August 2022
ISBN Information: