ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.11, No. 12)

Publication Date:

Authors : ;

Page : 1227-1237

Keywords : Attribute-Based Encryption; Multi-Authority; Mobile Cloud Computing; Cache Scheduling.;

Source : Downloadexternal Find it from : Google Scholarexternal


Outsourcing confidential data to an untrusted cloud system and allowing mobile device access have raised numerous security issues and delay in access. The main concern is the availability of the required data and the integrity in the decision to allow access to the data. The first line of defence that prevents unauthorized access to the data is known as access control. Fine-grained access control using attribute-based encryption mechanisms can be enforced as the first line of defence on the untrusted cloud to forbid unauthorized access to the stored data. In ABE, the key issuing authority will decide whether to allow or refuse user access. However, the current technique has a minor failure in authority and depends on centralizing storage. Security attacks on the current method prove that the existing scheme encounters security flaws. The authority and storage can be the cause of failure that will tarnish the ABE availability. At the same time, the integrity of the key authority can be questioned due to key abuse. To overcome this challenge, a novel multi-authority with failover node and decentralized storage with consensus authority mechanism was introduced to increase the scheme's availability and integrity. Furthermore, communication complexity is increasing between mobile devices and the cloud, especially during peak hours. To improve these issues, the cache-aware scheduling technique was used to reduce the time and read in a cloud environment.

Last modified: 2021-02-23 20:19:42