Efficient Management that Enables Diverse Access to Secure Internet of Things Fog-Based Data

Authors

  • E. Sai Kumar, Dr. C.V. Madhusudan Reddy, Dr. K. Venkataramana, M. Akshitha Laasya, B. Naga Raju

DOI:

https://doi.org/10.17762/msea.v69i1.1583

Abstract

Abstract-To maintain data privacy and control who has access to what in the cloud, attribute-based encryption might be utilized. Attribute security is violated when apparent qualities are introduced to the encrypted message to assist people identify necessary details in vast systems. To offer an effective attribute-based access control with an authorized search strategy, this research expands the anonymous key-policy attribute-based encryption (AKP-ABE) to provide fine-grained data retrieval while safeguarding attribute privacy (EACAS). In EACAS, data users may generate the trapdoor using the secret key supplied by data owners and conduct searches based on access restrictions to get the relevant data. Cryptographic protocols and trapdoor generation use a synthetic property devoid of syntactic significance to provide an attribute-based searching on the exported encoded information in the fog. Data owners may implement granular access control on their outsourced data by establishing the search criteria that will be used by data consumers to locate relevant content based on protected attributes. We show that compared to the state-of-the-art methods, EACAS requires less time and space to process and store data.

Downloads

Published

2020-01-28

How to Cite

E. Sai Kumar, Dr. C.V. Madhusudan Reddy, Dr. K. Venkataramana, M. Akshitha Laasya, B. Naga Raju. (2020). Efficient Management that Enables Diverse Access to Secure Internet of Things Fog-Based Data. Mathematical Statistician and Engineering Applications, 69(1), 29–38. https://doi.org/10.17762/msea.v69i1.1583

Issue

Section

Articles