banner

A hybrid framework to enhance cloud security for storing and retrieving confidential data in clouds

N. Krishnaveni, C. Jayakumari

Abstract


The  building pieces  for  creating a  secure cloud framework for  data exchange  with  authenticated and authorized users are ECC and ABAC. So, the goal of this study is to improve access control and encryption-related methods in order to increase security. The elliptic curve is a key component of the comparative study of cloud encryption and access control techniques. This research project’s main goal is to provide a security architecture that combines authenticated access with attribute-based access control and better elliptic curve encryption. The second goal is to provide a better mapping strategy with  reduced  time and  space complexity  for elliptic curve encoding  from  plain text.  To boost  the  performance  of  the standard ECC, a thorough algorithm focusing on designing an improved mapping mechanism for encoding plain text to elliptic curve points with excellent security has been included. The strength of the security should not be sacrificed in order to reduce security measures’ overhead costs. ABE is regarded as an effective way for protecting cloud data, according to study results. Because to the use of complex pairing processes, the same is difficult to use. As a result, a hybrid approach using ECC and ABAC performs better to handle the increasing processing capacity.

Keywords


attribute based encryption; elliptic curve cryptography; attribute based access control; cloud security; security framework

Full Text:

PDF

References


1. Gbashi EK. Proposed secret encoding method based genetic algorithm for elliptic curve cryptography method. Iraqi Journal of Information Technology 2018; 8(3): 21–46.

2. Reyad O. Text message encoding based on elliptic curve cryptography and a mapping methodology. Information Sciences Letters 2018; 7(1): 7–11.

3. Keerthi K, Surendiran B. Elliptic curve cryptography for secured text encryption. In: Proceedings of 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT); 20–21 April 2017; Kollam, India. pp. 1–5.

4. Younes L, Youssef A, Saiida L. Definition and implementation of an elliptic curve cryptosystem using a new message mapping scheme. In: Proceedings of the 3rd International Conference on Networking, Information Systems & Security; 23–25 March 2020; Athens, Greece. pp. 1–6.

5. Almajed HN, Almogren AS. SE-Enc: A secure and efficient encoding scheme using elliptic curve cryptography. IEEE Access 2019; 7: 175865–175878. doi: 10.1109/ACCESS.2019.2957943

6. Mahto D, Yadav DK. Performance analysis of RSA and elliptic curve cryptography. International Journal of Network Security 2018; 20(4): 625–635. doi: 10.6633/IJNS.201807 20(4).04)

7. Dhanda SS, Singh B, Jindal P. Demystifying elliptic curve cryptography: Curve selection, implementation and countermeasures to attacks. Journal of Interdisciplinary Mathematics 2020; 23(2): 463–470. doi: 10.1080/09720502.2020.1731959

8. Alimoradi R, Arkian HR, Razavian SMJ, Ramzi A. Scalar multiplication in elliptic curve libraries. Journal of Discrete Mathematical Sciences and Cryptography 2021; 24(3): 657–666. doi: 10.1080/09720529.2017.1378411

9. Gayoso Martinez V, Hernández Encinas L, Martín Muñoz A, Durán Díaz R. Secure elliptic curves and their performance. Logic Journal of the IGPL 2019; 27(2): 277–238. doi: 10.1093/jigpal/jzy035

10. Errahmani HB, Ikni H. Verifiable self-selecting secret sharing based on elliptic curves. International Journal of Software Innovation (IJSI) 2020; 8(3): 51–68. doi: 10.4018/IJSI.2020070104

11. Naji MA, Hammood DA, Atee HA, et al. Cryptanalysis cipher text using new modeling: Text encryption using elliptic curve cryptography. AIP Conference Proceedings 2020; 2203(1): 020003. doi: 10.1063/1.5142095

12. Roy S, Khatwani C. Cryptanalysis and improvement of ECC based authentication and key exchanging protocols. Cryptography 2017; 1(1): 9. doi: 10.3390/cryptography1010009

13. Ding S, Li C, Li H. A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access 2018; 6: 27336–27345. doi: 10.1109/ACCESS.2018.2836350

14. Belguith S, Kaaniche N, Laurent M, et al. PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Computer Networks 2018; 133: 141–156. doi: 10.1016/j.comnet.2018.01.036

15. Xue Y, Xue K, Gai N, et al. An attribute-based controlled collaborative access control scheme for public cloud storage. IEEE Transactions on Information Forensics and Security 2019; 14(11): 2927–2942. doi: 10.1109/TIFS.2019.2911166

16. Sowjanya K, Dasgupta M, Ray S, Obaidat MS. An efficient elliptic curve cryptography-based without pairing KPABE for Internet of Things. IEEE Systems Journal 2019; 14(2): 2154–2163. doi: 10.1109/JSYST.2019.2944240

17. Lu Y, Li J. Constructing pairing-free certificateless public key encryption with keyword search. Frontiers of Information Technology & Electronic Engineering 2019; 20(8): 1049–1060. doi: 10.1631/FITEE.1700534

18. Han J, Li Y, Chen W. A lightweight and privacy-preserving public cloud auditing scheme without bilinear pairings in smart cities. Computer Standards & Interfaces 2019; 62: 84–97. doi: 10.1016/j.csi.2018.08.004

19. Ding S, Cao J, Li H. Efficient pairing-free CP-ABE based on ordered binary decision diagram. Journal on Communications 2019; 40(12): 1–8. doi: 10.11959/j.issn.1000-436x.2019234

20. Hijawi U, Unal D, Hamila R, et al. Performance evaluation of no-pairing ECC-based KPABE on IoT platforms. In: Proceedings of 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT); 2–5 February 2020; Doha, Qatar. pp. 225–230.

21. Sowjanya K, Dasgupta M. A ciphertext-policy Attribute based encryption scheme for wireless body area networks based on ECC. Journal of Information Security and Applications 2020; 54: 102559. doi: 10.1016/j.jisa.2020.102559

22. Ometov A, Bezzateev S, Makitalo N, et al. Multi-factor authentication: A survey. Cryptography 2018; 2(1): 1. doi: 10.3390/cryptography2010001

23. Anakath AS, Rajakumar S, Ambika S. Privacy preserving multi factor authentication using trust management. Cluster Computing 2019; 22(5): 10817–10823. doi: 10.1007/s10586-017-1181-0




DOI: https://doi.org/10.32629/jai.v6i2.566

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 N. Krishnaveni, C. Jayakumari

License URL: https://creativecommons.org/licenses/by-nc/4.0