International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |
| TITLE | Enhanced Data Security in Cloud by CP-ABE Access Control Scheme |
|---|---|
| ABSTRACT | Cloud computing provides scalable storage and flexible data sharing, but it introduces serious security challenges such as unauthorized access and data leakage. This paper proposes an Enhanced Data Security model using Ciphertext-Policy Attribute-Based Encryption (CP-ABE) access control scheme. The proposed scheme ensures fine- grained, scalable, and flexible access control over encrypted data stored in the cloud. The system encrypts sensitive data using attribute-based policies, ensuring that only authorized users with valid attributes can decrypt the information. Performance evaluation shows that the proposed approach improves confidentiality, access flexibility, and data integrity compared to traditional encryption methods. |
| AUTHOR | SUYASH NAIK, SATYAM PALLAKHE, ARYAN PAWAR, ADARSH PATIL, S.J.DANOLE Students, Department of CSIT, Sharad Institute of Technology Polytechnic, Ichalkaranji, Maharashtra, India Lecturer, Department of CSIT, Sharad Institute of Technology Polytechnic, Ichalkaranji, Maharashtra, India |
| VOLUME | 181 |
| DOI | DOI: 10.15680/IJIRCCE.2026.1402025 |
| pdf/25_Enhanced Data Security in Cloud by CP-ABE Access Control Scheme.pdf | |
| KEYWORDS | |
| References | 1. Sahai, A., Waters, B., “Fuzzy Identity-Based Encryption,” EUROCRYPT, 2005. 2. Bethencourt, J., Sahai, A., Waters, B., “Ciphertext-Policy Attribute-Based Encryption,” IEEE Security and Privacy Symposium, 2007. 3. Goyal, V., Pandey, O., Sahai, A., Waters, B., “Attribute-Based Encryption for Fine-Grained Access Control,” ACM CCS, 2006. 4. Yu, S., Wang, C., Ren, K., Lou, W., “Achieving Secure and Scalable Data Access Control in Cloud Computing,” IEEE INFOCOM, 2010. 5. Wang, C., Ren, K., Lou, W., Li, J., “Secure and Dependable Cloud Storage Services,” IEEE Transactions on Services Computing. |