AES–CP–IDABE: A Privacy Protection Framework against a DoS Attack in the Cloud Environment with the Access Control Mechanism

: Cloud computing technology has revolutionized the ﬁeld of data management as it has enhanced the barriers of storage restrictions and high-cost establishment for its users. The beneﬁts of the cloud have paved the way for its extensive implementation in large enterprises. However, the data in the cloud have succumbed to various security threats, and its privacy issues remain one of the biggest and topmost concerns for the data owners. Several techniques, such as Attribute-based Encryption (ABE), have been proposed by several researchers to preserve the privacy of the data. However, the issue of security still looms largely over the cloud. In the present work, we introduce the novel encryption model called “Advanced Encryption Standard–Cipher-text-Identity and Attribute-based Encryption” (AES–CP–IDABE) to preserve data privacy along with its access control. In the proposed scheme, the data have been double encrypted initially through the ABE, along with the attributes and the identity of the user. Secondly, the Advanced Encryption Standard (AES) is used to encrypt the encrypted data and provide it to the authorized users. The user access control is established using the digital signature with the help of user ID and security keys. Additionally, the set up includes Denial-of-Service (DoS) detection through IP address monitoring and control. The proposed scheme has also been evaluated for its performance in the communication between the user and the data owner, along with the user’s execution time. From the outcome, it is evident that the proposed scheme was more e ﬀ ective than the existing scheme of ABE over execution, encryption, and decryption time. Additionally, the performance over DoS detection and impact of attribute numbers for the proposed scheme was also studied to prove its e ﬀ ectiveness.


Introduction
With the advent of cloud computing technology, the domain of networking with data is on the rise. This technique has been accepted extensively around the world in recent times. The intense evolution and implementation of the cloud environment have happened due to its ability to handle massive data at a minimal cost, along with its flexible access policies. This has caused many public and private enterprises to establish a cloud network for their data management purpose and their users [1]. However, like any other technology, cloud computing also suffers from numerous privacy and security concerns that remain as a hindrance to its complete adoption [2]. If the existing problems related to cloud security are not addressed appropriately, the chances are that it might prevent the 1.
We developed a novel ABE model using AES cryptography and identity-based access control at the owner's side and the user's side in the cloud environment. We name the novel algorithm as "AES Cipher-text-Identity and Attribute-Based Encryption" or AES-CP-IDABE in short.

2.
We provide the owner-side authentication with the necessary information of the owner. This becomes the attribute for their key generation through which they can access the cloud environment. 3.
For the user-side, we provide two layers for generating the attributes that will be implemented during the authentication process. Initially, the user's basic information is employed for identity generation along with five random questions, which can ensure the credibility and validity of the authorized user. 4.
The data in our model is encrypted using AES cryptography, and it is effectively decrypted with the independent keys of the user 6. 5.
Along with securing the data, our model also shows reduced overhead and resource consumption, which is a crucial requirement for its real-time implementation.
Our paper is divided into different sections and subsections as follows: after the introductory section, Section 2 discusses the related works on the cloud environment and its security that are completed explicitly in the field of data privacy and access control. Section 3 discusses the proposed methodology for accomplishing the authentication along with the defense against DoS attacks. Section 4 highlights the working principle of the proposed system model. Section 5 describes the control mechanism and security model implementation. Section 6 presents the control of the proposed algorithm. Section 7 presents the evaluation of the proposed methodology, along with its comparison Information 2020, 11, 372 3 of 15 to the existing techniques. The final Section 8, summarizes the paper with a conclusion and provides insights for future work.

Related Work
An embryonic tool is proposed in [11] for updating the key and providing the zero-knowledge authentication for cloud privacy through data auditing. The approach reduced the cost of both computation and communication with essential security. The real-time verification is not carried out to understand the practical problems. The authors in [12] proposed the Hierarchical Predicate Encryption (HPE) technique for improving the privacy of the cloud data. They also used the Keyword Search with Access Control (KSAC), which provides the fine-grained access control under a multi-field query search. The proposed method has been validated with the real-time application and found to be effective. In [13], a novel and secure K-Nearest Neighbor (KNN) query scheme is proposed for protecting the privacy of the cloud data. The method has been validated for its security in a theoretical approach, and it is found to be effective after extensive trials. The authors of [14] proposed another KNN query scheme. They provided multiple keys for preserving the privacy of the encrypted data with a distributed Double Trapdoor Public-Key Cryptosystem (DT-PKC) and protocols set. From the extensive evaluation, the proposed method exhibited its effectiveness in both performances as well as security.
In [15], an attribute-based method has been established for the storage system in the cloud for protecting privacy. This method avoided the deduplication of data in it. It also provides the access policy without the usage of the decryption key. In [16], the attribute-based encryption has been implemented in the multi-publisher cloud environment in which the subscriber accesses the published data. In this approach, the outsourcing model provides the encryption method. In [17], the attribute-based scheme has been implemented to verify the attributes set along with the cipher-text under both the offline and online mode. The method is based on a weak decisional bilinear Diffie-Hellman method in a restricted resource environment. The main limitation of this method is the revocation of the attributes in data sharing. In [18], a cipher-text-ABE scheme is proposed with the use of access policies that are defined at the owner's side of the data. The evaluated outcome proves the effectiveness and performance. It is observed that the established method is feasible only under the limited resource environment.
In [19], a Security-enhanced Multi-Authority Attribute-based Encryption (SMA-ABE) is provided to attain access control of fine-grained order and efficient decryption with provable transformation and offload on the cloud. As a result, it provides storage efficiency, computation, and communication and completes the detection in a shorter time compared to other schemes with similar detection accuracy. In [20], a novel framework is proposed to monitor the synchronize packets flowing through the correlation engine or a flow traffic tool. For detecting the attack source, packet marking techniques and time-to-live (TTL) is used. A honeypot technique is also used for the prevention of attacks. In [21], another Fast-malformed Hypertext transfer protocol-message Detection Algorithm (FHDA) is proposed to provide priority to the recurrent malformed elements, and it enhances the priority of detection in each field based on the previous detection results. The presented scheme was able to complete the detection in a shorter time by maintaining the detection accuracy.
In [22], an intrusion detection model was proposed using the machine learning technique to detect the DoS attack. The signature-based approach is employed for classifying four benchmark datasets and accomplished the detection rate of 96%. In [23], a novel two-fold security scheme was proposed with the Public key Encryption Keyword Search (PEKS) and Role-based Access Control (RBAC). The proposed framework did not perform the bilinear mapping and achieved an efficiency of about 97%. The security proof of the proposed model is validated based on its different components through the available commercial datasets. In [24], an extensive survey of the different security frameworks that are employed to secure a patient's data in the cloud environment is studied. It highlighted the importance of preserving healthcare data effectively. The study suggested that future research on cloud security must provide a fool-proof privacy mechanism to secure data sustainably. In [25], a decentralized ABE with multiple authority for securing the cloud is proposed. The proposed mechanism provided the complete solution to the previously established security scheme of Lewko and Waters through an effective mechanism for key distribution.
In [26], a novel identity-based encryption with an equality test supporting flexible authorization is proposed for protecting the privacy of the cloud data. In this technique, the equality test is performed to verify whether two encrypted cipher-texts have the same message. The outcome of the experiments showed that the proposed scheme was effective in providing security. In [27], the improved form of CP-ABE is proposed for the secure sharing of data in the cloud environment. The comparison with the existing scheme showed that the proposed scheme is highly reliable and safe. In [28], a novel secure system is proposed with an algorithm of role re-encryption and convergent encryption. It was named the Secure Role Re-encryption System (SRRS). The proposed system supports the validation for both owners and users through the mapping between the keys and roles through the role authorization tree. The system encloses both the revocation and key updating mechanism to secure the data from any leakage. Simulation experiments validate the effectiveness of the proposed security system.
From the extensive survey of the related works, a comparison of which is given in Table 1, we observed that the ABE methods are being widely implemented for preserving data privacy and providing access control. However, some problems still exist for the data in the cloud environment. The following are the problem statements for the present work:

•
When malicious users launch the cyber-attacks on cloud storage, resource consumption will increase. • The cryptography-driven access control does not protect the cloud provider against many attacks.

•
The cloud provider does not implement access control effectively and does not prevent access from unauthorized users effectively.

Preliminaries
The present work involves the usage of the cipher-text policy attribute-based encryption with the identity of a user (CP-IDABE) and the advanced encryption standards (AES). The preliminaries for the proposed dual encryption algorithm are given in the following subsections.

CP-IDABE
The CP-IDABE combines both the user ID and the attributes for the cryptic mechanism of the cipher data under the access policy. The user can employ the generated key to encrypt and decrypt the data in the cloud environment. The ID of the user comprises the username and password. The attribute set includes a set of answers for the questions that were used to validate the user from accessing the cloud.

•
Attributes: In the proposed model, the attributes of the user can be one of the following items in the set of five: Last five digits of their credit card; (iii) Name of their hometown; (iv) Favorite team; (v) Favorite sports.
• Policy: Here, the access policy for the user has been designated by attribute A with the identity ID of the user U (A ∧ID ∧ U). The user identity obtained from the user name and password is listed along with the attribute in formulating the access policy that is set in the cloud. Hence, CP-IDABE secures the data from unauthorized access. On satisfying the given condition, the access will be approved, or else it will be denied.
The CP-IDABE consists of attributes A i , the following steps as setup, key generating technique (KeyGen), encryption (Enc) and decryption (Dec) in performing the cryptic mechanism to the cloud data: • Setup (1 P ): P is the security parameter that provides the Public key (P k ) and Master secret key (M k ) from the cloud server (CS).

•
KeyGen (M k , A i , ID u ): Given attributes A i and M k and the identity of the user (ID u ), this algorithm yields the private key of the user (S ki ). • Enc (P k , M, ID u , A): Given P k , the user identity (ID u ), the message M and an access policy (A), the Enc algorithm yields an initial Encrypted cipher-text (Ect). • Dec (S ki , Ect): Given the private key (S ki ) and an initially encrypted cipher-text (Ect), the Dec algorithm yields the message M if the ID u and A i satisfy the access policy (A).

AES-Cryptology
The AES algorithm is implemented in the proposed model to perform another cryptic operation using the cipher-text that was encrypted through CP-IDABE with a 256-bit key with 14 rounds. The AES algorithm has the following mechanism for encryption after the key generation, as shown in Figure 1. The generated AES key is shared with the user, along with the CP-ID-ABE key.

Dual Encryption of AES-CP-IDABE
In the proposed method, the data in the cloud is encrypted using a double-encryption algorithm. Initially, the data in the cloud is encrypted (Ect) with a secret key (S ) and public key (P ) obtained through the CP-IDABE algorithm based on its access policy (A), and the security parameter ( ). The digital signature (SD) is achieved with the signature key (Si). The encrypted text is again encrypted with the AES algorithm to provide the double-encrypted cipher-text ( ) with the secret key (K) and the message (M1).

Working Principle of the proposed System Model
The system model for the proposed algorithm, as seen in Figure 2, consists of three significant components, as explained below: share and store the data on the cloud, which can be accessed by authorized users. They are also responsible for uploading the data into the specified cloud and encrypt it with the proposed AES-CP-IDABE. If any attack takes place in the cloud environment, then they are the ones who get affected the most. • Data user: Data users utilize the data that are stored on the cloud. It also decrypts the encrypted

Digital Signature
• SignGen (IDu, At, Mk): the identity of the user (IDu) and the access policy (At) along with the master key (Mk) yield the digital signature (SD) and the verifying message Mv.

Dual Encryption of AES-CP-IDABE
In the proposed method, the data in the cloud is encrypted using a double-encryption algorithm. Initially, the data in the cloud is encrypted (Ect) with a secret key (S ki ) and public key (P k ) obtained through the CP-IDABE algorithm based on its access policy (A), and the security parameter (λ). The digital signature (SD) is achieved with the signature key (S i ). The encrypted text is again encrypted with the AES algorithm to provide the double-encrypted cipher-text (Ect ) with the secret key (K) and the message (M 1 ).

Working Principle of the Proposed System Model
The system model for the proposed algorithm, as seen in Figure 2, consists of three significant components, as explained below:

Dual Encryption of AES-CP-IDABE
In the proposed method, the data in the cloud is encrypted using a double-encryption algorithm. Initially, the data in the cloud is encrypted (Ect) with a secret key (S ) and public key (P ) obtained through the CP-IDABE algorithm based on its access policy (A), and the security parameter ( ). The digital signature (SD) is achieved with the signature key (Si). The encrypted text is again encrypted with the AES algorithm to provide the double-encrypted cipher-text ( ) with the secret key (K) and the message (M1).

Working Principle of the proposed System Model
The system model for the proposed algorithm, as seen in Figure 2, consists of three significant components, as explained below: share and store the data on the cloud, which can be accessed by authorized users. They are also responsible for uploading the data into the specified cloud and encrypt it with the proposed AES- • Data owner: The data owner plays a vital role in any cloud environment. They are the ones who share and store the data on the cloud, which can be accessed by authorized users. They are also responsible for uploading the data into the specified cloud and encrypt it with the proposed AES-CP-IDABE. If any attack takes place in the cloud environment, then they are the ones who get affected the most. • Data user: Data users utilize the data that are stored on the cloud. It also decrypts the encrypted data through the authentication keys provided by the data owner. The cloud server has to authorize them based on their identity and permission attributes to access the cloud and the stored data.

•
Cloud server: The cloud server is an integral part of the proposed work in securing the cloud environment. All the data from the data owners and the users are stored on the server. It contains all the keys and the digital signature of all the users, along with their attributes and ID. Servers are designed to verify the difference between the user's access and the owner's access to the cloud environment. Besides authenticaticating the user, it also monitors resource utilization in the cloud.

Control Mechanism and Security Model
For providing adequate security to the data in the cloud environment, the proposed framework embraces three different forms of control mechanism for each of the components, as shown in Figure 3. The proposed framework also ensures the security of data through access control, data privacy, and mitigating the DoS attacks. The three different forms of control mechanism for the data access (control I), which ensures the privacy of the data, authentication, and attack resistance (control II), the security of the cloud and, finally, monitoring of the user (control III) for effective resource utilization are explained below: • Control I: The data owner and the cloud service provider provide distinct authentication to access the cloud. The data owner takes the responsibility of assigning the access policy for the data in the cloud. Hence, the user who has the access policy privileges can only access the data by decrypting it.

•
Control II: The cloud server performs the validation of the user before allowing them to access the data and decrypt them. This, in turn, provides resistance against the malicious DoS attacks.

•
Control III: The data owner in this model can monitor the user in the cloud server for maintaining the usage of the resource.
Additionally, the DoS attack detection and mitigation system are incorporated to prevent it from accessing the cloud. The security of the cloud environment in the proposed methodology is explained as follows: • Access control-Since the user attributes and their ID are both used for the authentication of the user; the attacker cannot breach the initial login process easily. In addition to this, while the user information is being processed for authenticating its access to the cloud, one of the five random questions connected to the attributes will pop up. The user can enter the cloud environment only after the verification of the answers to the random pop-up questions. Furthermore, in our model, we provide a separate authentication process for cloud service providers and the data owner. • Data privacy-AES has never been cracked yet, and it is safe against any brute force attacks contrary to common beliefs and arguments. Additionally, even if the attacker somehow breaches the AES key because of its symmetry, they must know the novel CP-IDABE key as well to obtain the actual data, which is very complex with the well-defined access policies and random ID of the user. The double encryption process preserves data privacy as the encryption key, and a decryption key is a dual form of both AES and CP-IDABE. Hence, the data in the cloud is adequately protected.

•
Against the DoS attacks-In general, DoS attacks occur with an increased number of fake requests from the external hacker's source. Once the attacker enters the cloud, the number of request flow increases. Therefore, the cloud service provider in the proposed model initiates the attack detection and mitigation framework. It encloses the mechanism that captures the IP address and stores them in the cloud server to mitigate the attacker. If the attacker tries to access the cloud, it will block the user and protect the cloud environment from the DoS attack. In the present work, four common DoS attack forms that are considered are mentioned below: • User datagram protocol (UDP) flood: In this type of DoS attack, a server is flooded with UDP packets. This makes it harder for defensive mechanisms to identify the attack. • SYN flood: It is carried out when an attacker sends many SYN packets to the target server from spoofed IP addresses.

•
Internet control message protocol (ICMP) flood: When a server is flooded with massive amounts of spoofed ICMP packets, its resources are exhausted in trying to process these requests. This overload reboots the server and has an enormous impact on its performance. • HTTP flood: In an HTTP flood attack, the adversary floods massive spurious HTTP requests for downloading an online file from the target server.
all the keys and the digital signature of all the users, along with their attributes and ID. Servers are designed to verify the difference between the user's access and the owner's access to the cloud environment. Besides authenticaticating the user, it also monitors resource utilization in the cloud.

Control Mechanism and Security Model
For providing adequate security to the data in the cloud environment, the proposed framework embraces three different forms of control mechanism for each of the components, as shown in Figure  3. The proposed framework also ensures the security of data through access control, data privacy, and mitigating the DoS attacks. The three different forms of control mechanism for the data access (control I), which ensures the privacy of the data, authentication, and attack resistance (control II), the security of the cloud and, finally, monitoring of the user (control III) for effective resource utilization are explained below: • Control I: The data owner and the cloud service provider provide distinct authentication to access the cloud. The data owner takes the responsibility of assigning the access policy for the data in the cloud. Hence, the user who has the access policy privileges can only access the data by decrypting it.

•
Control II: The cloud server performs the validation of the user before allowing them to access the data and decrypt them. This, in turn, provides resistance against the malicious DoS attacks.

•
Control III: The data owner in this model can monitor the user in the cloud server for maintaining the usage of the resource. Additionally, the DoS attack detection and mitigation system are incorporated to prevent it from accessing the cloud. The security of the cloud environment in the proposed methodology is explained as follows: • Access control-Since the user attributes and their ID are both used for the authentication of the user; the attacker cannot breach the initial login process easily. In addition to this, while the user information is being processed for authenticating its access to the cloud, one of the five We assume that in the cloud environment, the network flow is in a specified unit of time (T), source IP address (SI), destination IP address (DI), and the port (P) of the data packet, respectively. Based on the request information, the signature for the connection is generated. The classes of attacks are predefined with four classes, as discussed above. The class for each attack is denoted as S A for a SYN attack, U A for UDP attack, I A for ICMP attack, and H A for HTTP attack. The categorization of blocked users is given as follows: If the cloud server accumulates SYN packets (SYN PCk ) without an acknowledgment packet, it overwhelms the cloud server. SYN flood is detected to be the attack (S A ) If the UDP packets (UDP PCk ) accumulation increases and are sent back as destination-unreachable packets, it overwhelms the cloud server, and UDP flood is detected to be the attack (U A ) If the number of ICMP (ICMP Req ) echo-requests overwhelm the cloud server, ICMP flood is detected to be the attack (I A ) If the number of the HTTP requests (HTTP req ) overwhelms the cloud server, HTTP flood is detected to be the attack (H A ) The mitigation is carried out through the Firewall Inbound and Outbound (FIO) rules, where inbound rules deal with external attackers, and outbound rules deal with internal attacks. For all attackers, the IP and Virtual Port (VP) address are extracted and treated with FIO, as shown in the expressions below: where S iA , U iA , C iA , H iA are the attackers with SYN packets, UDP packets, ICMP and HTTP requests with IP and VP addresses of (IP is , VP is ), (IP iU , VP iU ), (IP iC , VP iC ), (IP iH , VP iH ), respectively.

The Flow of Control for the Proposed Algorithm
The proposed framework comprises three different phases with generating the cryptographic keys through CP-IDABE-AES algorithms and a digital signature in the cloud server (CS). The algorithm for each process is defined along with the input and output variables below:

Key Generation for CP-IDABE
• P k , M k ← P : The cloud server runs the initial setup for the generated cloud data and provides the public key (P k ) and the master key (M k ) with the security parameter (P). • S ki ← M k , ID u , A i : When the public and the master key are generated, and the user processes their request, the CS generates the secret key (S ki ) with the master key (M k ) along with the identity (ID u ) and attribute set (A i ). • Ect ← P k , M, ID u , A i : The data in the cloud were encrypted before being uploading into the cloud with the encrypted key, which results in the generation of the encrypted cipher-text (Ect) with the public key (P k )user identity (ID u ) attribute policy (A) and the message M. • M ← S ki , Ect : When the user provides the secret key for the encrypted cipher-text, the process of decryption begins, and the message M is obtained.

AES-ALGORITHM
• Ect ← M , k : By providing the decrypted data as the input for the AES cryptography, the data will be encrypted again to result in Ect with the key (K) and the message M . • M ← k, Ect : With the encrypted data Ect and the key (k), the data will be decrypted to produce the message M .

Signature Generation
• SD ← ID u , A i , M v : The CS picks the attributes and user identification (ID u ) for generating the digital signature (SD) with the message. • Verify ← SD, M v : For verifying the user, they must provide the digital signature SD along with the verification message M v .

Results and Discussion
The proposed security framework of the data in the cloud is implemented using Java, and the required data were accumulated in the drop-box. The interfaces in the cloud were achieved through the Java API for eXtensible Markup Language (XML) web services hosted with the help of Apache Tomcat. The Structured Query Language (SQL) database was updated on the server-side for storing the data. A Java-supporting Internet browser forms the client-side. The remaining basic configuration was to use an Intel processor with a memory of 16 GB at 2.45 GHz with a disk of 1 TB capacity.
The proposed approach was evaluated over three-parameters, namely: • Cloud user communication: The amount of data that is consumed during the interaction of the user and the cloud server. The proposed AES-CP-IDABE was compared with the existing basic ABE scheme for data security and attack detection with smart detection system [22] and shown in the following subsections.

Cloud User Communication and User Execution Time
In the evaluation of the user communication for the proposed method, it was observed to be around 1000 KB. The value was almost equal to the existing method of basic ABE. This shows that the enhancement in the basic ABE does not affect the data transmission in the cloud, as shown in Figure 4. The user data execution time was observed to be 178 ms, which was comparatively lower than that of the existing models with 189 ms. Hence, it was evident that the proposed method was 7.4% more efficient than the ABE method. Thus, by employing the proposed method, the data user execution time was reduced considerably, as shown in Figure 4. The proposed AES-CP-IDABE was compared with the existing basic ABE scheme for data security and attack detection with smart detection system [22] and shown in the following subsections.

Cloud User Communication and User Execution Time
In the evaluation of the user communication for the proposed method, it was observed to be around 1000 KB. The value was almost equal to the existing method of basic ABE. This shows that the enhancement in the basic ABE does not affect the data transmission in the cloud, as shown in Figure 4. The user data execution time was observed to be 178 ms, which was comparatively lower than that of the existing models with 189 ms. Hence, it was evident that the proposed method was 7.4% more efficient than the ABE method. Thus, by employing the proposed method, the data user execution time was reduced considerably, as shown in Figure 4.

Communication of Data Owner
The data owner uploads the data in the cloud system that can be used by many authorized users. The proposed method was evaluated for upload communication with varying numbers of users. After the analysis, it was observed that the proposed data owner communication increases with an increase in the number of users. A typical pattern was observed in both the proposed and existing methods. However, the proposed method showed better performance with a value of 895 KB

Communication of Data Owner
The data owner uploads the data in the cloud system that can be used by many authorized users. The proposed method was evaluated for upload communication with varying numbers of users. After the analysis, it was observed that the proposed data owner communication increases with an increase in the number of users. A typical pattern was observed in both the proposed and existing methods. However, the proposed method showed better performance with a value of 895 KB compared to the existing ABE methods with 990 KB, as shown in Figure 5.

Communication of Data Owner
The data owner uploads the data in the cloud system that can be used by many authorized users. The proposed method was evaluated for upload communication with varying numbers of users. After the analysis, it was observed that the proposed data owner communication increases with an increase in the number of users. A typical pattern was observed in both the proposed and existing methods. However, the proposed method showed better performance with a value of 895 KB compared to the existing ABE methods with 990 KB, as shown in Figure 5.

Time Cost for Encryption and Decryption
The time and costs involved in encrypting and decrypting different-sized data with an increasing number of cipher-text attributes are given in Tables 2 and 3. It was observed that both the encryption and decryption time of the proposed approach were higher than the Improved-CP-ABE (I-CP-ABE) [27] when the number of attributes was less. However, when there is an increase in the attributes, the difference between the times decreases. It was also observed that the proposed AES-CP-IDABE performs better with attributes of more than 40 KB. The comparison graph is plotted for the different data sizes in Figures 6 and 7.

Performance of Different Attacks
The present security framework of AES-CP-IDABE has an attack mitigation system. For analyzing the system, the customized dataset [22] was employed in the security framework. The four frequent attacks are considered for the study, and their prevalence is detected and mitigated effectively. The performance metrics on the various attacks on the proposed security framework are

Performance of Different Attacks
The present security framework of AES-CP-IDABE has an attack mitigation system. For analyzing the system, the customized dataset [22] was employed in the security framework. The four frequent attacks are considered for the study, and their prevalence is detected and mitigated effectively. The performance metrics on the various attacks on the proposed security framework are

Performance of Different Attacks
The present security framework of AES-CP-IDABE has an attack mitigation system. For analyzing the system, the customized dataset [22] was employed in the security framework. The four frequent attacks are considered for the study, and their prevalence is detected and mitigated effectively. The performance metrics on the various attacks on the proposed security framework are shown in Table 4. The SYN flood was detected with an accuracy of 98.6% along with the precision and F1 measure value (tradeoff value of recall and precision) of 0.995.  [22] regarding the detection of the DoS attacks. The F1 measure of the proposed framework is about 99.5%, similar to the existing SDS framework. However, the performance regarding precision indicated that the proposed framework is slightly better than the current SDS, with a variation of about 0.3%. Finally, the accuracy of the proposed framework is about 98%, which is better than the existing SDS framework with an accuracy of 96.5% of the customizable data, as shown in Figure 8.   [22] regarding the detection of the DoS attacks. The F1 measure of the proposed framework is about 99.5%, similar to the existing SDS framework. However, the performance regarding precision indicated that the proposed framework is slightly better than the current SDS, with a variation of about 0.3%. Finally, the accuracy of the proposed framework is about 98%, which is better than the existing SDS framework with an accuracy of 96.5% of the customizable data, as shown in Figure 8.

Conclusion and Future Work
The novel scheme of encryption, AES-CP-IDABE, was proposed to protect the privacy of data on the cloud storage space. The proposed scheme performed double encryption on the data stored in the cloud. The IDABE performed the initial encryption, followed by the secondary encryption through AES. The access control was provided based on the digital signature that was generated using the user ID and key from the cloud server. The authentication was provided for the owner and the user of data in the cloud environment. The attribute set was constructed with five questions that appear randomly as the user tries to access the cloud. Both user and owner evaluated the proposed scheme to find their performance for the communication with the standard ABE concerning the execution time for the user. From the comparison, it was evident that the novel scheme was better than the existing ABE scheme with reduced data owner communication and execution time of the

Conclusions and Future Work
The novel scheme of encryption, AES-CP-IDABE, was proposed to protect the privacy of data on the cloud storage space. The proposed scheme performed double encryption on the data stored in the cloud. The IDABE performed the initial encryption, followed by the secondary encryption through AES. The access control was provided based on the digital signature that was generated using the user ID and key from the cloud server. The authentication was provided for the owner and the user of data in the cloud environment. The attribute set was constructed with five questions that appear randomly as the user tries to access the cloud. Both user and owner evaluated the proposed scheme to find their performance for the communication with the standard ABE concerning the execution time for the user. From the comparison, it was evident that the novel scheme was better than the existing ABE scheme with reduced data owner communication and execution time of the data user. The scheme additionally provides information on the DoS attack through the IP address of the attacker. The performance of attack detection is evaluated and compared on metrics like accuracy, precision, and F1 measures. The comparison showed that the proposed framework has an accuracy of 98% regarding attack detection, which is significantly better than the existing model with enhanced attack mitigation.
Future work may involve establishing a novel scheme for a role-based multi-user cloud environment. The scheme can be enhanced to provide more security and robustness of the cloud environment. In recent times, the number of users in the cloud environment has increased tremendously, and there is a need for multi-owner clouds. Generally, the organizations have a different group of users, and their attributes vary from one to another. Henceforth, the proposed scheme can be improved to handle the multi-owner nature and user groups in the cloud more effectively and efficiently.