Secure Data Access: Attribute-based Encryption with Key Management Services

International Journal of Electronics and Communication Engineering
© 2025 by SSRG - IJECE Journal
Volume 12 Issue 4
Year of Publication : 2025
Authors : Pachipala Yellamma, Gandrala Varun, Challapalli Charan Kumar, Addala Shanmukha Sai Phani Kumar, Mahamkali Nagendra Rao
pdf
How to Cite?

Pachipala Yellamma, Gandrala Varun, Challapalli Charan Kumar, Addala Shanmukha Sai Phani Kumar, Mahamkali Nagendra Rao, "Secure Data Access: Attribute-based Encryption with Key Management Services," SSRG International Journal of Electronics and Communication Engineering, vol. 12,  no. 4, pp. 36-48, 2025. Crossref, https://doi.org/10.14445/23488549/IJECE-V12I4P104

Abstract:

The security of cloud computing is enhancing rapidly. Data owners usually encrypt their data so that certain users can decode it, protecting the privacy of data stored in the cloud. If an encrypted device needs to be shared with more individuals than the owner has designated, this could lead to very serious issues. In this research, the proposed end-of-end cloud data encryption utilizing the Attribute-Based Key Management Encryption Algorithm (ABKMEA) produces public and private key pairs for the users participating in the data exchange. The proposed ABKME algorithm is the best approach to address the throughput, performance and less computational time. The proposed algorithm ABKMEA gives the computational time of 128 bits is 1.79 sec, 192 bits is 1.81 sec, 256 bits is 2.02sec, 512 bits is 2.11sec, 1024 bits is 2.42sec,2048 bits is 2.42sec,3072 bits is 2.62sec, and 4096 bits is 2.74sec. Therefore, the proposed Attribute-Based Key Management Encryption Algorithm is the best approach for End to End Encryption associated with encrypting and decrypting the data in cloud computing environments.

Keywords:

Symmetric and asymmetric keys, Key attributes, Key Management Systems (KMS), Data security, Cloud computing, Data privacy, Key lifecycle management.

References:

[1] Runhua Xu, Chao Li, and James Joshi, “Blockchain-Based Transparency Framework for Privacy Preserving Third-Party Services,” IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 3, pp. 2302-2313, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Liron David et al., “Eddystone-EID: Secure and Private Infrastructural Protocol for BLE Beacons,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3877-3889, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Weiqi Dai et al., “TNGuard: Securing IoT Oriented Tenant Networks Based on SDN,” IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1411-1423, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Muhammad Irfan Khalid et al., “A Comprehensive Survey on Blockchain-Based Decentralized Storage Networks,” IEEE Access, vol. 11, pp. 10995-11015, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Weiting Zhang et al., “A Secure Revocable Fine-Grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems,” IEEE Internet of Things Journal, vol. 9, no. 3, pp. 1976-1984, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Maria Stoyanova et al., “A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues,” IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1191-1221, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Tanya Shreedhar et al., “Evaluating QUIC Performance Over Web, Cloud Storage, and Video Workloads,” IEEE Transactions on Network and Service Management, vol. 19, no. 2, pp. 1366-1381, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Kedir Mamo Besher, Zareen Subah, and Mohammed Zamshed Ali, “IoT Sensor Initiated Healthcare Data Security,” IEEE Sensors Journal, vol. 21, no. 10, pp. 11977-11982, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Abebe Diro et al., “Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication,” IEEE Access, vol. 8, pp. 60539-60551, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Zia Ullah et al., “Towards Blockchain-Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment,” IEEE Access, vol. 10, pp. 36978-36994, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Osama Ahmed Khashan, “Secure Outsourcing and Sharing of Cloud Data Using a User-Side Encrypted File System,” IEEE Access, vol. 8, pp. 210855-210867, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Kwangsu Lee, “Comments on “Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption,” IEEE Transactions on Cloud Computing, vol. 8, no. 4, pp. 1299-1300, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Ako Muhamad Abdullah, “Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data,” Cryptography and Network Security, vol. 16, no. 1, pp. 1-12, 2017.
[Google Scholar]
[14] Sagarika Behera, and Jhansi Rani Prathuri, “Design of Novel Hardware Architecture for Fully Homomorphic Encryption Algorithms in FPGA for Real-Time Data in Cloud Computing,” IEEE Access, vol. 10, pp. 131406-131418, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Mohammed Y. Shakor et al., “Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security,” IEEE Access, vol. 12, pp. 26334-26343, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Hua Deng et al., “Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3168-3180, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Pengtao Liu, “Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing,” IEEE Access, vol. 8, pp. 16750-16759, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Zhiwei Wang, Longwen Lan, and Siuming Yiu, “Chameleon Hash Based Efficiently Updatable Oblivious Key Management,” IEEE Transactions on Services Computing, vol. 16, no. 6, pp. 4503-4513, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Xinyu Meng, Lei Zhang, and Burong Kang, “Fast Secure and Anonymous Key Agreement against Bad Randomness for Cloud Computing,” IEEE Transactions on Cloud Computing, vol. 10, no. 3, pp. 1819-1830, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Sriramulu Bojjagani et al., “Secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 12, pp. 24698-24713, 2022.
[CrossRef] [Google Scholar] [Publisher Link]