Journal of Cyber Security and Risk Auditing

ISSN: 3079-5354 (Online)

Publishing model:

: Open access
open accessOpen Access

Article

Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing

by 

Siti Dhalila Mohd Satar ;

Masnida Hussin ;

Mohamad Afendee Mohamed ;

Nazirah Abd Hamid ;

Mohd Fadzil Abd Kadir ;

Roslinda Muda ;

Joshua Samual

PDF logoPDF

Published: 2025

Abstract

Cipher text-Policy Attribute-Based Encryption is an access control technique widely used in cloud computing for enforcing data access policies based on attributes. However, existing Cipher text-Policy Attribute-Based Encryption schemes suffer from an issue of user’s privacy leakage and increasing cipher text size as the number of attributes in the access policy grows, leading to computational overheads and security vulnerabilities. In this research, we propose a modified Cipher text-Policy Attribute-Based Encryption scheme that addresses both privacy preservation and the problem of increasing cipher text size. Our system achieves a significant reduction in cipher text size, regardless of the number of user-given attributes, thereby ensuring efficiency and enhancing data privacy. We accomplish this by implementing an access policy hiding mechanism that conceals the attribute location and adapting OptiSize Text to eliminates redundant text in input files. Experimental results demonstrate the effectiveness of our proposed system in overcoming challenges related to data privacy and computational overheads. By significantly reducing encryption time and cipher text size, our scheme improves efficiency and enhances the security of cloud computing applications.

Keywords

Access ControlCP-ABEPerformance OptimizationCloud Computing

How to Cite the Article

Satar, S. D. M., Hussin, M., Afendee Mohamed, M., Abd Hamid, N., Abd Kadir, M. F., Muda, R., & Samual, J. (2025). Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing. Journal of Cyber Security and Risk Auditing, 2025(4), 287–305. https://doi.org/10.63180/jcsra.thestap.2025.4.8

References

  1. Bethencourt, J., & Waters, B. (2007). Ciphertext-Policy Attribute-Based Encryption. IEEE Computer Society.
  2. Bethencourt, J., Waters, B., Sahai, A., & Waters, B. (2007). Ciphertext-Policy Attribute-Based Encryption. 2007 IEEE Symposium on Security and Privacy (SP ’07), 321–334. https://doi.org/10.1109/SP.2007.11
  3. Cui, H., Deng, R. H., & Li, Y. (2018). Attribute-based cloud storage with secure provenance over encrypted data. Future Generation Computer Systems, 79, 461–472. https://doi.org/10.1016/j.future.2017.10.010
  4. Edemacu, K., Jang, B., & Kim, J. W. (2020). Efficient and Expressive Access Control with Revocation for Privacy of PHR Based on OBDD Access Structure. IEEE Access, 8, 18546–18557. https://doi.org/10.1109/ACCESS.2020.2968078
  5. Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. CCS ’06: Proceedings of the 13th ACM Conference on Computer and Communications Security, 89–98.
  6. Hao, J., Huang, C., Ni, J., Rong, H., Xian, M., & Shen, X. (Sherman). (2019). Fine-grained data access control with attribute-hiding policy for cloud-based IoT. Computer Networks, 153, 1–10. https://doi.org/10.1016/j.comnet.2019.02.008
  7. Kahani, N., Elgazzar, K., & Cordy, J. R. (2016). Authentication and Access Control in e-Health Systems in the Cloud. 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), 13–23. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.43
  8. Khuntia, S., & Kumar, P. S. (2018). New Hidden Policy CP-ABE for Big Data Access Control with Privacy-preserving Policy in Cloud Computing. 2018 9th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2018, 1–7. https://doi.org/10.1109/ICCCNT.2018.8493698
  9. Li, H., Li, J., Zhang, Y., Chen, X., You, I., & Wong, D. S. (2017). Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences, 379, 42–61. https://doi.org/10.1016/j.ins.2016.04.015
  10. Lopez, J., & Rubio, J. E. (2018). Access control for cyber-physical systems interconnected to the cloud. Computer Networks, 134, 46–54. https://doi.org/10.1016/j.comnet.2018.01.037
  11. Mohamed, A. K. Y. S., Auer, D., Hofer, D., & Küng, J. (2022). A systematic literature review for authorization and access control: definitions, strategies and models. International Journal of Web Information Systems. https://doi.org/10.1108/IJWIS-04-2022-0077
  12. Narasingapuram, P. B., & Ponnavaikko, M. (2021). A Secure Cloud Authentication and Access Control System for Cloud Infrastructure. IT in Industry, 9(2).
  13. P, P. K., P, S. K., & Alphonse, P. J. A. (2018). Journal of Network and Computer Applications Attribute based encryption in cloud computing : A survey, gap analysis, and future directions. Journal of Network and Computer Applications, 108(December 2017), 37–52. https://doi.org/10.1016/j.jnca.2018.02.009
  14. Phuong, T. V. X., Yang, G., & Susilo, W. (2016a). Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Transactions on Information Forensics and Security, 11(1), 35–45. https://doi.org/10.1109/TIFS.2015.2475723
  15. Ramachandra, G., Iftikhar, M., & Khan, F. A. (2017). A Comprehensive Survey on Security in Cloud Computing. Procedia Computer Science, 110(2012), 465–472. https://doi.org/10.1016/j.procs.2017.06.124
  16. Sabitha, S., & Rajasree, M. S. (2017). Access control based privacy preserving secure data sharing with hidden access policies in cloud. Journal of Systems Architecture, 75, 50–58. https://doi.org/10.1016/j.sysarc.2017.03.002
  17. Susilo, W., Yang, G., Guo, F., & Huang, Q. (2018). Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Information Sciences, 429, 349–360. https://doi.org/10.1016/j.ins.2017.11.037
  18. Vijayalakshmi, K., & Jayalakshmi, V. (2021). Shared Access Control Models for Big Data: A Perspective Study and Analysis (pp. 397–410). https://doi.org/10.1007/978-981-15-8443-5_33
  19. Xue, L., Yu, Y., Li, Y., Au, M. H., Du, X., & Yang, B. (2018). Efficient attribute-based encryption with attribute revocation for assured data deletion. Information Sciences, 0, 1–11. https://doi.org/10.1016/j.ins.2018.02.015
  20. Y, J., S, W., M, Y., & G, F. (2016). Ciphertext-Policy Attribute Based EncryptionSupporting Access Policy Update. Provable Security, 10005, 39–60. https://doi.org/10.1007/978-3-319-47422-9
  21. Yin, H., Li, Y., Li, F., Deng, H., Zhang, W., & Li, K. (2022). An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT. Journal of Systems Architecture, 128. https://doi.org/10.1016/j.sysarc.2022.102533
  22. Younis, Y. A., Kifayat, K., & Merabti, M. (2014). An access control model for cloud computing. Journal of Information Security and Applications, 19(1), 45–60. https://doi.org/10.1016/j.jisa.2014.04.003
  23. Younis, Y. A., Kifayat, K., & Merabti, M. (2016). A novel evaluation criteria to cloud based access control models. In Proceedings - 2015 11th International Conference on Innovations in Information Technology, IIT 2015 (pp. 68–73). https://doi.org/10.1109/INNOVATIONS.2015.7381517
  24. Zhang, L., Cui, Y., Mu, Y., & Member, S. (2020). Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing. IEEE SYSTEMS JOURNAL, 14(1), 1–11. https://doi.org/10.1109/JSYST.2019.2911391
  25. Zhang, L., Hu, G., Mu, Y., & Rezaeibagha, F. (2019). Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system. IEEE Access, 7, 33202–33213. https://doi.org/10.1109/ACCESS.2019.2902040
  26. Zhang, R., Ma, H., & Lu, Y. (2017). Fine-grained access control system based on fully outsourced attribute-based encryption. Journal of Systems and Software, 125, 344–353. https://doi.org/10.1016/j.jss.2016.12.018
  27. Zhang, Y., Zheng, D., & Deng, R. H. (2018). Security and Privacy in Smart Health : Efficient Access Control. IEEE Internet of Things Journal, 5(3), 2130–2145. https://doi.org/10.1109/JIOT.2018.2825289
  28. Zhang, Z., Zhang, W., & Qin, Z. (2021). A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing. Future Generation Computer Systems, 123, 181–195. https://doi.org/10.1016/j.future.2021.04.022
  29. Zhao, C., Xu, L., Li, J., Fang, H., & Zhang, Y. (2022). Toward Secure and Privacy-Preserving Cloud Data Sharing: Online/Offline Multiauthority CP-ABE With Hidden Policy. IEEE Systems Journal. https://doi.org/10.1109/JSYST.2022.3169601