An Efficient Hybrid QHCP-ABE Model to Improve Cloud Data Integrity and Confidentiality
-
Published:2022-10-28
Issue:21
Volume:11
Page:3510
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Singamaneni Kranthi KumarORCID, Nauman AliORCID, Juneja SapnaORCID, Dhiman GauravORCID, Viriyasitavat Wattana, Hamid YasirORCID, Anajemba Joseph Henry
Abstract
Cloud computational service is one of the renowned services utilized by employees, employers, and organizations collaboratively. It is accountable for data management and processing through virtual machines and is independent of end users’ system configurations. The usage of cloud systems is very simple and easy to organize. They can easily be integrated into various storages of the cloud and incorporated into almost all available software tools such as Hadoop, Informatica, DataStage, and OBIEE for the purpose of Extraction-Transform-Load (ETL), data processing, data reporting, and other related computations. Because of this low-cost-based cloud computational service model, cloud users can utilize the software and services, the implementation environment, storage, and other on-demand resources with a pay-per-use model. Cloud contributors across this world move all these cloud-based apps, software, and large volumes of data in the form of files and databases into enormous data centers. However, the main challenge is that cloud users cannot have direct control over the data stored at these data centers. They do not even know the integrity, confidentiality, level of security, and privacy of their sensitive data. This exceptional cloud property creates several different security disputes and challenges. To address these security challenges, we propose a novel Quantum Hash-centric Cipher Policy-Attribute-based Encipherment (QH-CPABE) framework to improve the security and privacy of the cloud user’s sensitive data. In our proposed model, we used both structured and unstructured big cloud clinical data as input so that the simulated experimental results conclude that the proposal has precise, resulting in approximately 92% correctness of bit hash change and approximately 96% correctness of chaotic dynamic key production, enciphered and deciphered time as compared with conventional standards from the literature.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference55 articles.
1. Qian, L., Luo, Z., Du, Y., and Guo, L. Cloud Computing: An Overview. Cloud Computing, Proceedings of the IEEE International Conference on Cloud Computing, Beijing, China, 1–4 December 2009, 2009. 2. Shamir, A. Identity-Based Cryptosystems and Signature Schemes. Advances in Cryptology, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, 9–11 April 1984, 1984. 3. Boneh, D., and Franklin, M. Identity-Based Encryption from the Weil pairing. Advances in Cryptology—CRYPTO 2001, Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2001, 2001. 4. Amit, S., and Waters, B. Fuzzy Identity-Based Encryption. Advances in Cryptology—EUROCRYPT 2005, Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 22–26 May 2005, 2005. 5. Waters, B. Efficient Identity-Based Encryption without Random Oracles. Advances in Cryptology—EUROCRYPT 2005, Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 22–26 May 2005, 2005.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|