Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data

PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribut...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of pervasive computing and communications 2024-11, Vol.20 (5), p.593-606
Hauptverfasser: R., Mohan Naik, Gadiyar, H. Manoj T., M., Sharath S., Bharathrajkumar, M., K., Sowmya T.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 606
container_issue 5
container_start_page 593
container_title International journal of pervasive computing and communications
container_volume 20
creator R., Mohan Naik
Gadiyar, H. Manoj T.
M., Sharath S.
Bharathrajkumar, M.
K., Sowmya T.
description PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.
doi_str_mv 10.1108/IJPCC-06-2022-0223
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3125892869</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3125892869</sourcerecordid><originalsourceid>FETCH-LOGICAL-c198t-2b2e3728d1b7f3ed8f1627b226742ad9f3521a7577c64fe56a137bfc28697e853</originalsourceid><addsrcrecordid>eNo9kEtLAzEQgIMoWKt_wFPAczSPbpI9ylK1UtCDggchZPOgKdvdNcmC9de724owwwzDx8zwAXBN8C0hWN6tnl-rCmGOKKYUjclOwIyIBUWCyY_T_16Qc3CR0hZjLhmRM_C5bDe6Nc5CE_qNizC774z6rglmD3XOMdRDdqjWaURca-K-z6FroW4tTC4G3YQffZiMsXM2aGiabrDQ6qwvwZnXTXJXf3UO3h-Wb9UTWr88rqr7NTKklBnRmjomqLSkFp45Kz3hVNSU8vFpbUvPCkq0KIQwfOFdwTVhovaGSl4KJws2BzfHvX3svgaXstp2Q2zHk4oRWshyIkeKHikTu5Si86qPYafjXhGsJovqYFFhriaLarLIfgH18GX5</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3125892869</pqid></control><display><type>article</type><title>Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data</title><source>Standard: Emerald eJournal Premier Collection</source><creator>R., Mohan Naik ; Gadiyar, H. Manoj T. ; M., Sharath S. ; Bharathrajkumar, M. ; K., Sowmya T.</creator><creatorcontrib>R., Mohan Naik ; Gadiyar, H. Manoj T. ; M., Sharath S. ; Bharathrajkumar, M. ; K., Sowmya T.</creatorcontrib><description>PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.</description><identifier>ISSN: 1742-7371</identifier><identifier>EISSN: 1742-738X</identifier><identifier>DOI: 10.1108/IJPCC-06-2022-0223</identifier><language>eng</language><publisher>Bingley: Emerald Group Publishing Limited</publisher><subject>Access control ; Algorithms ; Cloud computing ; Completion time ; Confidentiality ; Constraints ; Control systems ; Cryptography ; Data encryption ; Data storage ; Data transmission ; Datasets ; Encryption ; Internet of Things ; Number systems ; Residue number systems ; Social networks ; Time measurement</subject><ispartof>International journal of pervasive computing and communications, 2024-11, Vol.20 (5), p.593-606</ispartof><rights>Emerald Publishing Limited.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c198t-2b2e3728d1b7f3ed8f1627b226742ad9f3521a7577c64fe56a137bfc28697e853</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,21674,27901,27902</link.rule.ids></links><search><creatorcontrib>R., Mohan Naik</creatorcontrib><creatorcontrib>Gadiyar, H. Manoj T.</creatorcontrib><creatorcontrib>M., Sharath S.</creatorcontrib><creatorcontrib>Bharathrajkumar, M.</creatorcontrib><creatorcontrib>K., Sowmya T.</creatorcontrib><title>Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data</title><title>International journal of pervasive computing and communications</title><description>PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Cloud computing</subject><subject>Completion time</subject><subject>Confidentiality</subject><subject>Constraints</subject><subject>Control systems</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Data storage</subject><subject>Data transmission</subject><subject>Datasets</subject><subject>Encryption</subject><subject>Internet of Things</subject><subject>Number systems</subject><subject>Residue number systems</subject><subject>Social networks</subject><subject>Time measurement</subject><issn>1742-7371</issn><issn>1742-738X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNo9kEtLAzEQgIMoWKt_wFPAczSPbpI9ylK1UtCDggchZPOgKdvdNcmC9de724owwwzDx8zwAXBN8C0hWN6tnl-rCmGOKKYUjclOwIyIBUWCyY_T_16Qc3CR0hZjLhmRM_C5bDe6Nc5CE_qNizC774z6rglmD3XOMdRDdqjWaURca-K-z6FroW4tTC4G3YQffZiMsXM2aGiabrDQ6qwvwZnXTXJXf3UO3h-Wb9UTWr88rqr7NTKklBnRmjomqLSkFp45Kz3hVNSU8vFpbUvPCkq0KIQwfOFdwTVhovaGSl4KJws2BzfHvX3svgaXstp2Q2zHk4oRWshyIkeKHikTu5Si86qPYafjXhGsJovqYFFhriaLarLIfgH18GX5</recordid><startdate>20241112</startdate><enddate>20241112</enddate><creator>R., Mohan Naik</creator><creator>Gadiyar, H. Manoj T.</creator><creator>M., Sharath S.</creator><creator>Bharathrajkumar, M.</creator><creator>K., Sowmya T.</creator><general>Emerald Group Publishing Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20241112</creationdate><title>Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data</title><author>R., Mohan Naik ; Gadiyar, H. Manoj T. ; M., Sharath S. ; Bharathrajkumar, M. ; K., Sowmya T.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c198t-2b2e3728d1b7f3ed8f1627b226742ad9f3521a7577c64fe56a137bfc28697e853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Cloud computing</topic><topic>Completion time</topic><topic>Confidentiality</topic><topic>Constraints</topic><topic>Control systems</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Data storage</topic><topic>Data transmission</topic><topic>Datasets</topic><topic>Encryption</topic><topic>Internet of Things</topic><topic>Number systems</topic><topic>Residue number systems</topic><topic>Social networks</topic><topic>Time measurement</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>R., Mohan Naik</creatorcontrib><creatorcontrib>Gadiyar, H. Manoj T.</creatorcontrib><creatorcontrib>M., Sharath S.</creatorcontrib><creatorcontrib>Bharathrajkumar, M.</creatorcontrib><creatorcontrib>K., Sowmya T.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of pervasive computing and communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>R., Mohan Naik</au><au>Gadiyar, H. Manoj T.</au><au>M., Sharath S.</au><au>Bharathrajkumar, M.</au><au>K., Sowmya T.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data</atitle><jtitle>International journal of pervasive computing and communications</jtitle><date>2024-11-12</date><risdate>2024</risdate><volume>20</volume><issue>5</issue><spage>593</spage><epage>606</epage><pages>593-606</pages><issn>1742-7371</issn><eissn>1742-738X</eissn><abstract>PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.</abstract><cop>Bingley</cop><pub>Emerald Group Publishing Limited</pub><doi>10.1108/IJPCC-06-2022-0223</doi><tpages>14</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1742-7371
ispartof International journal of pervasive computing and communications, 2024-11, Vol.20 (5), p.593-606
issn 1742-7371
1742-738X
language eng
recordid cdi_proquest_journals_3125892869
source Standard: Emerald eJournal Premier Collection
subjects Access control
Algorithms
Cloud computing
Completion time
Confidentiality
Constraints
Control systems
Cryptography
Data encryption
Data storage
Data transmission
Datasets
Encryption
Internet of Things
Number systems
Residue number systems
Social networks
Time measurement
title Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T07%3A27%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Enhanced%20cipher%20text-policy%20attribute-based%20encryption%20and%20serialization%20on%20media%20cloud%20data&rft.jtitle=International%20journal%20of%20pervasive%20computing%20and%20communications&rft.au=R.,%20Mohan%20Naik&rft.date=2024-11-12&rft.volume=20&rft.issue=5&rft.spage=593&rft.epage=606&rft.pages=593-606&rft.issn=1742-7371&rft.eissn=1742-738X&rft_id=info:doi/10.1108/IJPCC-06-2022-0223&rft_dat=%3Cproquest_cross%3E3125892869%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3125892869&rft_id=info:pmid/&rfr_iscdi=true