Cloud Storage That Makes Use Of A Feature-Based Encoding Hierarchy To Maximize Efficiency



Sharing data securely in the cloud is a major difficulty, but cipher text-policy attribute-based encryption has emerged as a top tool for meeting this need. The shared data files used in many different professions, including medicine and the military, have a multi-tiered, intricate structure. The file-sharing structure, however, has not been studied in cipher text-policy attribute-based encryption. Here, we provide a novel cloud-based encryption approach that takes advantage of hierarchies of file attributes. Before encrypting a folder tree, it is common practice to merge the various access controls into a single control scheme. Some components of the encryption text that pertain to attributes might be reused between files. The time and money needed to store encrypted documents and conduct encryption are therefore minimized. Finally, it is demonstrated that the proposed method is safe under the null hypothesis. In experimental simulations of encryption and decryption, the proposed method has been proven to be exceedingly efficient. Our method's advantages become more evident as more data is included.


T. H. Yuen, J. K. Liu, M. H. Au, X. Huang, W. Susilo, and J. Zhou, “k-times attribute-based anonymous access control for cloud comput-ing,” IEEE Trans. Comput., vol. 64, no. 9, pp. 2595–2608, Sep. 2015.

J.K.Liu,M.H.Au ,X.Huang, R.Lu,andJ.Li, “Fine-grainedtwo-factor access control for Web-based cloud computing services,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 3, pp. 484–497, Mar. 2016.

A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer, May 2005, pp. 457–473.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryp-tion for fine-grained access control of encrypted data,” in Proc. 13th ACM Conf. Comput. Commun. Secur., Oct. 2006, pp. 89–98.

W. Zhu, J. Yu, T. Wang, P. Zhang, and W. Xie, “Efficient attribute-based encryption from R-LWE,” Chin.J.Electron., vol. 23, no. 4, pp. 778–782, Oct. 2014.

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proc. IEEE Symp. Secur. Privacy, May 2007, pp. 321–334.

L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proc. 14th ACM Conf. Comput. Commun. Secur., Oct. 2007, pp. 456–465.

L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. 10th Int. Workshop Inf. Secur. Appl., Aug. 2009, pp. 309–323.

X. Xie, H. Ma, J. Li, and X. Chen, “An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing,” J. Universal Comput. Sci., vol. 19, no. 16, pp. 2349–2367, Oct. 2013.

F. Guo, Y. Mu, W. Susilo, D. S. Wong, and V. Varadharajan, “CYPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION with constant-size keys for lightweight devices,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 763–771, May 2014.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at