Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data
PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribut...
Gespeichert in:
Veröffentlicht in: | International journal of pervasive computing and communications 2024-11, Vol.20 (5), p.593-606 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 606 |
---|---|
container_issue | 5 |
container_start_page | 593 |
container_title | International journal of pervasive computing and communications |
container_volume | 20 |
creator | R., Mohan Naik Gadiyar, H. Manoj T. M., Sharath S. Bharathrajkumar, M. K., Sowmya T. |
description | PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process. |
doi_str_mv | 10.1108/IJPCC-06-2022-0223 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3125892869</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3125892869</sourcerecordid><originalsourceid>FETCH-LOGICAL-c198t-2b2e3728d1b7f3ed8f1627b226742ad9f3521a7577c64fe56a137bfc28697e853</originalsourceid><addsrcrecordid>eNo9kEtLAzEQgIMoWKt_wFPAczSPbpI9ylK1UtCDggchZPOgKdvdNcmC9de724owwwzDx8zwAXBN8C0hWN6tnl-rCmGOKKYUjclOwIyIBUWCyY_T_16Qc3CR0hZjLhmRM_C5bDe6Nc5CE_qNizC774z6rglmD3XOMdRDdqjWaURca-K-z6FroW4tTC4G3YQffZiMsXM2aGiabrDQ6qwvwZnXTXJXf3UO3h-Wb9UTWr88rqr7NTKklBnRmjomqLSkFp45Kz3hVNSU8vFpbUvPCkq0KIQwfOFdwTVhovaGSl4KJws2BzfHvX3svgaXstp2Q2zHk4oRWshyIkeKHikTu5Si86qPYafjXhGsJovqYFFhriaLarLIfgH18GX5</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3125892869</pqid></control><display><type>article</type><title>Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data</title><source>Standard: Emerald eJournal Premier Collection</source><creator>R., Mohan Naik ; Gadiyar, H. Manoj T. ; M., Sharath S. ; Bharathrajkumar, M. ; K., Sowmya T.</creator><creatorcontrib>R., Mohan Naik ; Gadiyar, H. Manoj T. ; M., Sharath S. ; Bharathrajkumar, M. ; K., Sowmya T.</creatorcontrib><description>PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.</description><identifier>ISSN: 1742-7371</identifier><identifier>EISSN: 1742-738X</identifier><identifier>DOI: 10.1108/IJPCC-06-2022-0223</identifier><language>eng</language><publisher>Bingley: Emerald Group Publishing Limited</publisher><subject>Access control ; Algorithms ; Cloud computing ; Completion time ; Confidentiality ; Constraints ; Control systems ; Cryptography ; Data encryption ; Data storage ; Data transmission ; Datasets ; Encryption ; Internet of Things ; Number systems ; Residue number systems ; Social networks ; Time measurement</subject><ispartof>International journal of pervasive computing and communications, 2024-11, Vol.20 (5), p.593-606</ispartof><rights>Emerald Publishing Limited.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c198t-2b2e3728d1b7f3ed8f1627b226742ad9f3521a7577c64fe56a137bfc28697e853</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,21674,27901,27902</link.rule.ids></links><search><creatorcontrib>R., Mohan Naik</creatorcontrib><creatorcontrib>Gadiyar, H. Manoj T.</creatorcontrib><creatorcontrib>M., Sharath S.</creatorcontrib><creatorcontrib>Bharathrajkumar, M.</creatorcontrib><creatorcontrib>K., Sowmya T.</creatorcontrib><title>Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data</title><title>International journal of pervasive computing and communications</title><description>PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Cloud computing</subject><subject>Completion time</subject><subject>Confidentiality</subject><subject>Constraints</subject><subject>Control systems</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Data storage</subject><subject>Data transmission</subject><subject>Datasets</subject><subject>Encryption</subject><subject>Internet of Things</subject><subject>Number systems</subject><subject>Residue number systems</subject><subject>Social networks</subject><subject>Time measurement</subject><issn>1742-7371</issn><issn>1742-738X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNo9kEtLAzEQgIMoWKt_wFPAczSPbpI9ylK1UtCDggchZPOgKdvdNcmC9de724owwwzDx8zwAXBN8C0hWN6tnl-rCmGOKKYUjclOwIyIBUWCyY_T_16Qc3CR0hZjLhmRM_C5bDe6Nc5CE_qNizC774z6rglmD3XOMdRDdqjWaURca-K-z6FroW4tTC4G3YQffZiMsXM2aGiabrDQ6qwvwZnXTXJXf3UO3h-Wb9UTWr88rqr7NTKklBnRmjomqLSkFp45Kz3hVNSU8vFpbUvPCkq0KIQwfOFdwTVhovaGSl4KJws2BzfHvX3svgaXstp2Q2zHk4oRWshyIkeKHikTu5Si86qPYafjXhGsJovqYFFhriaLarLIfgH18GX5</recordid><startdate>20241112</startdate><enddate>20241112</enddate><creator>R., Mohan Naik</creator><creator>Gadiyar, H. Manoj T.</creator><creator>M., Sharath S.</creator><creator>Bharathrajkumar, M.</creator><creator>K., Sowmya T.</creator><general>Emerald Group Publishing Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20241112</creationdate><title>Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data</title><author>R., Mohan Naik ; Gadiyar, H. Manoj T. ; M., Sharath S. ; Bharathrajkumar, M. ; K., Sowmya T.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c198t-2b2e3728d1b7f3ed8f1627b226742ad9f3521a7577c64fe56a137bfc28697e853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Cloud computing</topic><topic>Completion time</topic><topic>Confidentiality</topic><topic>Constraints</topic><topic>Control systems</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Data storage</topic><topic>Data transmission</topic><topic>Datasets</topic><topic>Encryption</topic><topic>Internet of Things</topic><topic>Number systems</topic><topic>Residue number systems</topic><topic>Social networks</topic><topic>Time measurement</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>R., Mohan Naik</creatorcontrib><creatorcontrib>Gadiyar, H. Manoj T.</creatorcontrib><creatorcontrib>M., Sharath S.</creatorcontrib><creatorcontrib>Bharathrajkumar, M.</creatorcontrib><creatorcontrib>K., Sowmya T.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of pervasive computing and communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>R., Mohan Naik</au><au>Gadiyar, H. Manoj T.</au><au>M., Sharath S.</au><au>Bharathrajkumar, M.</au><au>K., Sowmya T.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data</atitle><jtitle>International journal of pervasive computing and communications</jtitle><date>2024-11-12</date><risdate>2024</risdate><volume>20</volume><issue>5</issue><spage>593</spage><epage>606</epage><pages>593-606</pages><issn>1742-7371</issn><eissn>1742-738X</eissn><abstract>PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.</abstract><cop>Bingley</cop><pub>Emerald Group Publishing Limited</pub><doi>10.1108/IJPCC-06-2022-0223</doi><tpages>14</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1742-7371 |
ispartof | International journal of pervasive computing and communications, 2024-11, Vol.20 (5), p.593-606 |
issn | 1742-7371 1742-738X |
language | eng |
recordid | cdi_proquest_journals_3125892869 |
source | Standard: Emerald eJournal Premier Collection |
subjects | Access control Algorithms Cloud computing Completion time Confidentiality Constraints Control systems Cryptography Data encryption Data storage Data transmission Datasets Encryption Internet of Things Number systems Residue number systems Social networks Time measurement |
title | Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T07%3A27%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Enhanced%20cipher%20text-policy%20attribute-based%20encryption%20and%20serialization%20on%20media%20cloud%20data&rft.jtitle=International%20journal%20of%20pervasive%20computing%20and%20communications&rft.au=R.,%20Mohan%20Naik&rft.date=2024-11-12&rft.volume=20&rft.issue=5&rft.spage=593&rft.epage=606&rft.pages=593-606&rft.issn=1742-7371&rft.eissn=1742-738X&rft_id=info:doi/10.1108/IJPCC-06-2022-0223&rft_dat=%3Cproquest_cross%3E3125892869%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3125892869&rft_id=info:pmid/&rfr_iscdi=true |