International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |


TITLE Enhanced Data Security in Cloud by CP-ABE Access Control Scheme
ABSTRACT Cloud computing provides scalable storage and flexible data sharing, but it introduces serious security challenges such as unauthorized access and data leakage. This paper proposes an Enhanced Data Security model using Ciphertext-Policy Attribute-Based Encryption (CP-ABE) access control scheme. The proposed scheme ensures fine- grained, scalable, and flexible access control over encrypted data stored in the cloud. The system encrypts sensitive data using attribute-based policies, ensuring that only authorized users with valid attributes can decrypt the information. Performance evaluation shows that the proposed approach improves confidentiality, access flexibility, and data integrity compared to traditional encryption methods.
AUTHOR SUYASH NAIK, SATYAM PALLAKHE, ARYAN PAWAR, ADARSH PATIL, S.J.DANOLE Students, Department of CSIT, Sharad Institute of Technology Polytechnic, Ichalkaranji, Maharashtra, India Lecturer, Department of CSIT, Sharad Institute of Technology Polytechnic, Ichalkaranji, Maharashtra, India
VOLUME 181
DOI DOI: 10.15680/IJIRCCE.2026.1402025
PDF pdf/25_Enhanced Data Security in Cloud by CP-ABE Access Control Scheme.pdf
KEYWORDS
References 1. Sahai, A., Waters, B., “Fuzzy Identity-Based Encryption,” EUROCRYPT, 2005.
2. Bethencourt, J., Sahai, A., Waters, B., “Ciphertext-Policy Attribute-Based Encryption,” IEEE Security and Privacy Symposium, 2007.
3. Goyal, V., Pandey, O., Sahai, A., Waters, B., “Attribute-Based Encryption for Fine-Grained Access Control,” ACM CCS, 2006.
4. Yu, S., Wang, C., Ren, K., Lou, W., “Achieving Secure and Scalable Data Access Control in Cloud Computing,” IEEE INFOCOM, 2010.
5. Wang, C., Ren, K., Lou, W., Li, J., “Secure and Dependable Cloud Storage Services,” IEEE Transactions on Services Computing.
image
Copyright © IJIRCCE 2020.All right reserved