SECURE MULTI-AUTHORITY ATTRIBUTEBASED ENCRYPTION WITH CACHE-AWARE SCHEDULING FOR MOBILE CLOUD ACCESS CONTROL
Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.11, No. 12)Publication Date: 2020-12-31
Authors : Fara Jamal Mohd Taufik Abdullah Zurina Mohd. Hanapi Azizol Abdullah;
Page : 1227-1237
Keywords : Attribute-Based Encryption; Multi-Authority; Mobile Cloud Computing; Cache Scheduling.;
Abstract
Outsourcing confidential data to an untrusted cloud system and allowing mobile device access have raised numerous security issues and delay in access. The main concern is the availability of the required data and the integrity in the decision to allow access to the data. The first line of defence that prevents unauthorized access to the data is known as access control. Fine-grained access control using attribute-based encryption mechanisms can be enforced as the first line of defence on the untrusted cloud to forbid unauthorized access to the stored data. In ABE, the key issuing authority will decide whether to allow or refuse user access. However, the current technique has a minor failure in authority and depends on centralizing storage. Security attacks on the current method prove that the existing scheme encounters security flaws. The authority and storage can be the cause of failure that will tarnish the ABE availability. At the same time, the integrity of the key authority can be questioned due to key abuse. To overcome this challenge, a novel multi-authority with failover node and decentralized storage with consensus authority mechanism was introduced to increase the scheme's availability and integrity. Furthermore, communication complexity is increasing between mobile devices and the cloud, especially during peak hours. To improve these issues, the cache-aware scheduling technique was used to reduce the time and read in a cloud environment.
Other Latest Articles
- TRADE-OFF ANALYSIS IN IDENTIFYING POTENTIAL REUSABLE CORE ASSETS THROUGH SERVICE ORIENTED PRODUCT LINE
- ELECTRODES PLACEMENT DESIGN FOR CONTROLLING PERCEIVED PHOSPHENE POSITIONS BASED ON ELECTRIC FIELD SIMULATION
- INTEGRATION OF TEXT CLASSIFICATION AND FUZZY DEMATEL: AN APPLICATION TO E-COMMERCE USER REVIEWS
- REVIEW OF CHINESE CALLIGRAPHY FONT RECOGNITION METHODS
- IMPACT OF SYBIL ATTACK ON SECURE GEOGRAPHIC FORWARDING APPROACHES
Last modified: 2021-02-23 20:19:42