Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
Outsourcing confidential data to an untrusted cloud system and allowing mobile device access have raised numerous security issues and delay in access. The main concern is the availability of the required data and the integrity in the decision to allow access to the data. The first line of...
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Published: |
IAEME Publication
2020
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/87543/ |
| _version_ | 1848860455309672448 |
|---|---|
| author | Jamal, Fara Abdullah, Mohd Taufik Mohd Hanapi, Zurina Abdullah, Azizol |
| author_facet | Jamal, Fara Abdullah, Mohd Taufik Mohd Hanapi, Zurina Abdullah, Azizol |
| author_sort | Jamal, Fara |
| building | UPM Institutional Repository |
| collection | Online Access |
| description | Outsourcing confidential data to an untrusted cloud system and allowing mobile device access have raised numerous security issues and delay in access. The main concern is the availability of the required data and the integrity in the decision to allow access to the data. The first line of defence that prevents unauthorized access to the data is known as access control. Fine-grained access control using attribute-based encryption mechanisms can be enforced as the first line of defence on the untrusted cloud to forbid unauthorized access to the stored data. In ABE, the key issuing authority will decide whether to allow or refuse user access. However, the current technique has a minor failure in authority and depends on centralizing storage. Security attacks on the current method prove that the existing scheme encounters security flaws. The authority and storage can be the cause of failure that will tarnish the ABE availability. At the same time, the integrity of the key authority can be questioned due to key abuse. To overcome this challenge, a novel multi-authority with failover node and decentralized storage with consensus authority mechanism was introduced to increase the scheme's availability and integrity. Furthermore, communication complexity is increasing between mobile devices and the cloud, especially during peak hours. To improve these issues, the cache-aware scheduling technique was used to reduce the time and read in a cloud environment. |
| first_indexed | 2025-11-15T12:45:30Z |
| format | Article |
| id | upm-87543 |
| institution | Universiti Putra Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-15T12:45:30Z |
| publishDate | 2020 |
| publisher | IAEME Publication |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | upm-875432023-09-13T08:10:31Z http://psasir.upm.edu.my/id/eprint/87543/ Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control Jamal, Fara Abdullah, Mohd Taufik Mohd Hanapi, Zurina Abdullah, Azizol Outsourcing confidential data to an untrusted cloud system and allowing mobile device access have raised numerous security issues and delay in access. The main concern is the availability of the required data and the integrity in the decision to allow access to the data. The first line of defence that prevents unauthorized access to the data is known as access control. Fine-grained access control using attribute-based encryption mechanisms can be enforced as the first line of defence on the untrusted cloud to forbid unauthorized access to the stored data. In ABE, the key issuing authority will decide whether to allow or refuse user access. However, the current technique has a minor failure in authority and depends on centralizing storage. Security attacks on the current method prove that the existing scheme encounters security flaws. The authority and storage can be the cause of failure that will tarnish the ABE availability. At the same time, the integrity of the key authority can be questioned due to key abuse. To overcome this challenge, a novel multi-authority with failover node and decentralized storage with consensus authority mechanism was introduced to increase the scheme's availability and integrity. Furthermore, communication complexity is increasing between mobile devices and the cloud, especially during peak hours. To improve these issues, the cache-aware scheduling technique was used to reduce the time and read in a cloud environment. IAEME Publication 2020-12 Article PeerReviewed Jamal, Fara and Abdullah, Mohd Taufik and Mohd Hanapi, Zurina and Abdullah, Azizol (2020) Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control. International Journal of Advanced Research in Engineering and Technology, 11 (12). 1227 - 1237. ISSN 0976-6480; ESSN : 0976-6499 http://iaeme.com/Home/issue/IJARET?Volume=11&Issue=12 10.34218/IJARET.11.12.2020.118 |
| spellingShingle | Jamal, Fara Abdullah, Mohd Taufik Mohd Hanapi, Zurina Abdullah, Azizol Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control |
| title | Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control |
| title_full | Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control |
| title_fullStr | Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control |
| title_full_unstemmed | Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control |
| title_short | Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control |
| title_sort | secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control |
| url | http://psasir.upm.edu.my/id/eprint/87543/ http://psasir.upm.edu.my/id/eprint/87543/ http://psasir.upm.edu.my/id/eprint/87543/ |