Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Siti Dhalila Mohd Satar ;
Masnida Hussin ;
Mohamad Afendee Mohamed ;
Nazirah Abd Hamid ;
Mohd Fadzil Abd Kadir ;
Roslinda Muda ;
Joshua Samual
Published: 2025
Abstract
Cipher text-Policy Attribute-Based Encryption is an access control technique widely used in cloud computing for enforcing data access policies based on attributes. However, existing Cipher text-Policy Attribute-Based Encryption schemes suffer from an issue of user’s privacy leakage and increasing cipher text size as the number of attributes in the access policy grows, leading to computational overheads and security vulnerabilities. In this research, we propose a modified Cipher text-Policy Attribute-Based Encryption scheme that addresses both privacy preservation and the problem of increasing cipher text size. Our system achieves a significant reduction in cipher text size, regardless of the number of user-given attributes, thereby ensuring efficiency and enhancing data privacy. We accomplish this by implementing an access policy hiding mechanism that conceals the attribute location and adapting OptiSize Text to eliminates redundant text in input files. Experimental results demonstrate the effectiveness of our proposed system in overcoming challenges related to data privacy and computational overheads. By significantly reducing encryption time and cipher text size, our scheme improves efficiency and enhances the security of cloud computing applications.
Keywords
How to Cite the Article
Satar, S. D. M., Hussin, M., Afendee Mohamed, M., Abd Hamid, N., Abd Kadir, M. F., Muda, R., & Samual, J. (2025). Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing. Journal of Cyber Security and Risk Auditing, 2025(4), 287–305. https://doi.org/10.63180/jcsra.thestap.2025.4.8
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing is licensed under CC BY 4.0
References
- Bethencourt, J., & Waters, B. (2007). Ciphertext-Policy Attribute-Based Encryption. IEEE Computer Society.
- Bethencourt, J., Waters, B., Sahai, A., & Waters, B. (2007). Ciphertext-Policy Attribute-Based Encryption. 2007 IEEE Symposium on Security and Privacy (SP ’07), 321–334. https://doi.org/10.1109/SP.2007.11
- Cui, H., Deng, R. H., & Li, Y. (2018). Attribute-based cloud storage with secure provenance over encrypted data. Future Generation Computer Systems, 79, 461–472. https://doi.org/10.1016/j.future.2017.10.010
- Edemacu, K., Jang, B., & Kim, J. W. (2020). Efficient and Expressive Access Control with Revocation for Privacy of PHR Based on OBDD Access Structure. IEEE Access, 8, 18546–18557. https://doi.org/10.1109/ACCESS.2020.2968078
- Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. CCS ’06: Proceedings of the 13th ACM Conference on Computer and Communications Security, 89–98.
- Hao, J., Huang, C., Ni, J., Rong, H., Xian, M., & Shen, X. (Sherman). (2019). Fine-grained data access control with attribute-hiding policy for cloud-based IoT. Computer Networks, 153, 1–10. https://doi.org/10.1016/j.comnet.2019.02.008
- Kahani, N., Elgazzar, K., & Cordy, J. R. (2016). Authentication and Access Control in e-Health Systems in the Cloud. 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), 13–23. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.43
- Khuntia, S., & Kumar, P. S. (2018). New Hidden Policy CP-ABE for Big Data Access Control with Privacy-preserving Policy in Cloud Computing. 2018 9th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2018, 1–7. https://doi.org/10.1109/ICCCNT.2018.8493698
- Li, H., Li, J., Zhang, Y., Chen, X., You, I., & Wong, D. S. (2017). Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences, 379, 42–61. https://doi.org/10.1016/j.ins.2016.04.015
- Lopez, J., & Rubio, J. E. (2018). Access control for cyber-physical systems interconnected to the cloud. Computer Networks, 134, 46–54. https://doi.org/10.1016/j.comnet.2018.01.037
- Mohamed, A. K. Y. S., Auer, D., Hofer, D., & Küng, J. (2022). A systematic literature review for authorization and access control: definitions, strategies and models. International Journal of Web Information Systems. https://doi.org/10.1108/IJWIS-04-2022-0077
- Narasingapuram, P. B., & Ponnavaikko, M. (2021). A Secure Cloud Authentication and Access Control System for Cloud Infrastructure. IT in Industry, 9(2).
- P, P. K., P, S. K., & Alphonse, P. J. A. (2018). Journal of Network and Computer Applications Attribute based encryption in cloud computing : A survey, gap analysis, and future directions. Journal of Network and Computer Applications, 108(December 2017), 37–52. https://doi.org/10.1016/j.jnca.2018.02.009
- Phuong, T. V. X., Yang, G., & Susilo, W. (2016a). Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Transactions on Information Forensics and Security, 11(1), 35–45. https://doi.org/10.1109/TIFS.2015.2475723
- Ramachandra, G., Iftikhar, M., & Khan, F. A. (2017). A Comprehensive Survey on Security in Cloud Computing. Procedia Computer Science, 110(2012), 465–472. https://doi.org/10.1016/j.procs.2017.06.124
- Sabitha, S., & Rajasree, M. S. (2017). Access control based privacy preserving secure data sharing with hidden access policies in cloud. Journal of Systems Architecture, 75, 50–58. https://doi.org/10.1016/j.sysarc.2017.03.002
- Susilo, W., Yang, G., Guo, F., & Huang, Q. (2018). Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Information Sciences, 429, 349–360. https://doi.org/10.1016/j.ins.2017.11.037
- Vijayalakshmi, K., & Jayalakshmi, V. (2021). Shared Access Control Models for Big Data: A Perspective Study and Analysis (pp. 397–410). https://doi.org/10.1007/978-981-15-8443-5_33
- Xue, L., Yu, Y., Li, Y., Au, M. H., Du, X., & Yang, B. (2018). Efficient attribute-based encryption with attribute revocation for assured data deletion. Information Sciences, 0, 1–11. https://doi.org/10.1016/j.ins.2018.02.015
- Y, J., S, W., M, Y., & G, F. (2016). Ciphertext-Policy Attribute Based EncryptionSupporting Access Policy Update. Provable Security, 10005, 39–60. https://doi.org/10.1007/978-3-319-47422-9
- Yin, H., Li, Y., Li, F., Deng, H., Zhang, W., & Li, K. (2022). An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT. Journal of Systems Architecture, 128. https://doi.org/10.1016/j.sysarc.2022.102533
- Younis, Y. A., Kifayat, K., & Merabti, M. (2014). An access control model for cloud computing. Journal of Information Security and Applications, 19(1), 45–60. https://doi.org/10.1016/j.jisa.2014.04.003
- Younis, Y. A., Kifayat, K., & Merabti, M. (2016). A novel evaluation criteria to cloud based access control models. In Proceedings - 2015 11th International Conference on Innovations in Information Technology, IIT 2015 (pp. 68–73). https://doi.org/10.1109/INNOVATIONS.2015.7381517
- Zhang, L., Cui, Y., Mu, Y., & Member, S. (2020). Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing. IEEE SYSTEMS JOURNAL, 14(1), 1–11. https://doi.org/10.1109/JSYST.2019.2911391
- Zhang, L., Hu, G., Mu, Y., & Rezaeibagha, F. (2019). Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system. IEEE Access, 7, 33202–33213. https://doi.org/10.1109/ACCESS.2019.2902040
- Zhang, R., Ma, H., & Lu, Y. (2017). Fine-grained access control system based on fully outsourced attribute-based encryption. Journal of Systems and Software, 125, 344–353. https://doi.org/10.1016/j.jss.2016.12.018
- Zhang, Y., Zheng, D., & Deng, R. H. (2018). Security and Privacy in Smart Health : Efficient Access Control. IEEE Internet of Things Journal, 5(3), 2130–2145. https://doi.org/10.1109/JIOT.2018.2825289
- Zhang, Z., Zhang, W., & Qin, Z. (2021). A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing. Future Generation Computer Systems, 123, 181–195. https://doi.org/10.1016/j.future.2021.04.022
- Zhao, C., Xu, L., Li, J., Fang, H., & Zhang, Y. (2022). Toward Secure and Privacy-Preserving Cloud Data Sharing: Online/Offline Multiauthority CP-ABE With Hidden Policy. IEEE Systems Journal. https://doi.org/10.1109/JSYST.2022.3169601