You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

28 October 2022

An Efficient Hybrid QHCP-ABE Model to Improve Cloud Data Integrity and Confidentiality

,
,
,
,
,
and
1
Department of Computer Science and Engineering, School of Technology, GITAM Deemed to be University, Visakhapatnam 530045, India
2
Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Korea
3
Department of CS, KIET Group of Institutions, Delhi NCR, Ghaziabad 201206, India
4
Department of Electrical and Computer Engineering, Lebanese American University, Beirut 1102 2801, Lebanon
This article belongs to the Section Computer Science & Engineering

Abstract

Cloud computational service is one of the renowned services utilized by employees, employers, and organizations collaboratively. It is accountable for data management and processing through virtual machines and is independent of end users’ system configurations. The usage of cloud systems is very simple and easy to organize. They can easily be integrated into various storages of the cloud and incorporated into almost all available software tools such as Hadoop, Informatica, DataStage, and OBIEE for the purpose of Extraction-Transform-Load (ETL), data processing, data reporting, and other related computations. Because of this low-cost-based cloud computational service model, cloud users can utilize the software and services, the implementation environment, storage, and other on-demand resources with a pay-per-use model. Cloud contributors across this world move all these cloud-based apps, software, and large volumes of data in the form of files and databases into enormous data centers. However, the main challenge is that cloud users cannot have direct control over the data stored at these data centers. They do not even know the integrity, confidentiality, level of security, and privacy of their sensitive data. This exceptional cloud property creates several different security disputes and challenges. To address these security challenges, we propose a novel Quantum Hash-centric Cipher Policy-Attribute-based Encipherment (QH-CPABE) framework to improve the security and privacy of the cloud user’s sensitive data. In our proposed model, we used both structured and unstructured big cloud clinical data as input so that the simulated experimental results conclude that the proposal has precise, resulting in approximately 92% correctness of bit hash change and approximately 96% correctness of chaotic dynamic key production, enciphered and deciphered time as compared with conventional standards from the literature.

1. Introduction

Cloud Computing offers many types of facilities, among them Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS), providing enormous malleability for cloud consumers. Because of the exponential growth of the de-centralized reckoning and WWW cyberspace structures, there is a substantial prerequisite for cloud consumers’ personal and confidential data management and disseminating facilities provided via cloud-based environments. The third-party service-based dealer must use a trustworthy and consistent control supervision approach to improve the privacy and security aspects for cloud consumers. Specifically, such scenarios as the big data of cloud consumers stored over the cloud-based environment cultivates, then it leads user sensitive data such as consumers’ pecuniary info, biometric info, and public media info to be tremendously exposed over cyberspace and simply retrieved by intruders and attackers via some malicious third-party applications and [].
The Identity-based Encipherment (IBE) and Attribute-based Encipherment (ABE) methodologies are established for the maintenance of consumers’ privacy by concealing a portion of consumers’ sensitive data. The enhanced editions of conventional IBE and ABE enciphered approaches comprise a look-up approach for enciphered consumer text [,,,]. Therefore, the same technique can be employed in security maintenance apps over the domains such as banking, biomedical, and government warehouses to achieve a similar standard of integrity, privacy, and implementation alongside alternative traditional approaches are extra expensive w.r.t computational, storage costs, and network transmission expenditures. Most of the conventional Ciphered text Policy-ABE techniques failed to fulfill the requirements of ascendable diversified multimedia storing and distribution []. To address the abovementioned problems HQCP-ABE (Hybrid Quantum-based CP-ABE) technique is coined that is capable of handling large scales of diversified data with secure distribution over the cloud and cyberspace.
  • Large volumes of cloud consumers’ text messages are enciphered with the help of the encipherment method then produce the consumers’ ciphered text.
  • A key-policy-based tree is built, and the multimedia data are enciphered via the available keys by thinking cloud consumers’ admittance freedoms.
  • Consequently, the cloud consumer has essential attributes that fit with cloud consumers’ access-policy rights, and the decipherment algorithm is implemented.
In the case of cell phones, the trouble occurs due to inadequate availability of resources. This problem may be addressed with the subcontracting procedure of computational procedures to cloud servers. Because of this approach, we can improve the efficacy, security, privacy, and confidentiality of the cloud consumers’ sensitive info [,,].
The primary objective of the distribution of keys among multiple cloud consumers is to restrict the sharing of private and secret info primarily to concur on a chaotic, arbitrary key, which persists secret after an antagonist overhears their transmission. In traditional cryptographical and info methods, it is taken for granted that sensitive transmission may be constantly observed passively by intruders and cyber criminals, such that the cyber attackers and hackers guess their whole end-to-end transmission info such as type of data, source IP, destination IP, open ports available, possibility of data injections, etc., without knowledge and intelligence of the intended sender and receiver. But in the case of communication using elementary quantum systems, it is impossible to track the state of info during transmission of data because that intruder can’t predict the state of photon during transmission. When sensitive consumers info is enciphered over the fundamental quantum classifications such as the solitary photon, it may be conceivable to yield a communication link whose transmission [] may not in code be consistently observed or altered by an intruder unaware of confident info cast-off in establishing the communication. The intruder does not even get a portion of information about such communication without troubling it in a chaotic and unmanageable manner, possibly to be discovered by the links’ intended cloud consumers []. The important quantum acreage concerned, a demonstration of Heisenberg’s uncertainty law, is the presence of a combination of principles that are antagonistic in the perception that determining one acreage essentially arbitrarily changes the values of the others. For instance, determining an individual photon’s co-linear SOP randomizes its globular polarity [,,], and vice versa. In more general, any set of SOPs will be described as a base if they relate to a consistently discernible policy of a single photon, and two basements will be treated to be congruent [,]. If quantum physical properties proclinate, that determination of one acreage entirely randomizes the others. The elementary quantum key distribution (QKD) standard starts with a cloud consumer A transmits a randomized flow of the four canonic types of differentiated photons to another cloud consumer B. B then selects arbitrarily and individually for each photon (and separately of the preferences made by A, of course, since these preferences are unfamiliar to him at this instance) whether to determine the photon’s rectilinear or circular SOP’s. B then reveals openly which type of measurement he selected but not the output value of the measurement, and A reveals to B openly whether he did the exact measurement (i.e., horizontal, vertical, or left/right orthogonal). A and B then approve openly throwing away all cubit postures for which B executed the incorrect calculation. Likewise, they decide to remove cubit spots where B’s polarizers are unsuccessful in identifying the photon at all—a general occurrence with present polarizers at ophthalmic wavelengths. The polarization angles of the rest of the cubits are translated as bit 0 for horizontal or left-orthogonal and bit 1 for vertical and right-orthogonal. The resultant binary array of bits could be distributed private info among A and B, supplied that there is no snooping on the quantum link. The outcome of the above-mentioned stages is described as quantum communication (or occasionally the intense cubit transmission to accentuate, which was acquired soon after this procedure).
The rest of the paper is organized as follows: In Section 2, a review of the related literature works is presented. In Section 3, quantum and related cryptographic models and issues are discussed, research methodology is discussed in Section 4, Section 5 presents the results and analysis, and finally, the paper concludes in Section 6.

4. The Projected Model

Security over the cloud [] has turned into a complex and one of the important research fields with large volumes of sensitive consumer data and authenticated access structure design. To achieve more secure and reliable cloud services, we need to incorporate complex encipherment strategies; for this purpose, we used an enhanced Attribute Based Encipherment (ABE) [] process along with a quantum key distribution model (QKD). The QKD is applied for the proposed CP-ABE model to provide additional security for the user’s sensitive data over public networks. The QKD-based crypto-graphical approach is entirely based upon quantum physical and mechanical properties. The primary goal of QKD is to generate a secret key used for cloud consumers’ info encryption without the help of a third-party service provider. Conventional ABE schemes are not reliable, not secure, and vulnerable to M-I-M Attacks (Man in the Middle Attacks) [] over the transmittable sensitive info over the cloud and internet. When the size of the consumers’ data grows, conventional ABE schemes go bad w.r.t various parameters, such as encipherment time, key generation time, and revocation facility, etc. To address the abovementioned key issues, we use up the message digest, integrity, and QKD approach, which proposes a new CP-ABE scheme presented over the cloud platform. Along with these, we take some vital parameters of chaotic methods comprising pseudo-random number production property and sensitivity property to the actual primary requirements. Using all these properties, we can produce more complex confusion and diffusion characteristics, which are crucial for the encipherment process. For consumer information confidentiality and validation task, hash-based chaotic methods are employed to enhance the consumer’s info security and arbitration. Chaotic mappings are methods that are extremely sensitive to their initial requirements, which can develop highly variant outcomes. A small change in starting inputs towards chaotic methods can generate distinct outcomes.
Tri-linear Map: Tri-linear maps are a set of numerous arbitrary values that are linearly separate from each arbitrary value. Further accurately, a tri-linear map is a function
Fn: VS1 × VS2 × …… × VSN → Ꞷ
here VS1, VS2, …, VSN and Ꞷ are vector spaces with the subsequent characteristic. For every j, if all the arbitrary values except VSj kept fixed, then Fn (VS1, VS2, …, VSN) acts as a tri-linear function of VSj. One arbitrary value of a tri-linear function is a linear function, and two arbitrary values is a bilinear function. More generally, a multi-linear map of three arbitrary values is called a tri-linear map. If the subdomain of a tri-linear function is the domain of scalars, it is called a tri-linear structure []. If all arbitrary values fit into the similar vector space, then we may assume they are symmetrical, anti-symmetrical, and chaotic tri-linear functions. The later match is if the inherent areas (spaces) have a distinguishing behavior after two; otherwise the previous two match.
Let Fn: VS1 × VS2 × …… × VSN → Ꞷ be a tri-linear functional map among finite-dimensional vector spaces, where VSj has dimension dnj, and Ꞷ has dimension dn if we choose a basis {ej1, ej2, …, ejdj} for each VSj and a basis {bj1, bj2, …, bjdj} for Ꞷ with the help of bold part of vector spaces, then we can define a collection of scalars Sci1,i2…, in by
Fn (e1j1, e1j2, …, enjn) = S1i1,i2…,in bj1 + …… + Sdi1,i2…,in bjdj
Then the scalars {Sci1,i2…,in | 0 < ij < dj−1, 0 < c < d − 1} completely determine the tri-linear method Fn. In particular if
V Si = i = 0 d j v i j   e i j   for   0   <   j   <   n ,   then
F n   ( V S 1 ,   V S 2 ,     V SN ) = i 1 = 0 d 1   i n = 0 d n   c = 1 d S c i 1   i 2 i n   V s 1 j 1   V s n j n b c
Admissible Trilinear Map: Let’s take a tri-linear function
T n :   M 3 × M 3 × M 3 M   where   V j = M 3 ,   d j = 3 ,   j = 1 ,   2 ,   3 ,   and     =   M ,   d = 1 .
A basis for each V j is
{ e j 1 , , e j d j } = { E 1 , E 2 , E 3 } = { ( 0 , 0 , 0 ) , ( 0 , 0 , 1 ) , ( 0 , 1 , 0 ) , ( 0 , 1 , 1 ) , ( 1 , 0 , 0 ) , ( 1 , 0 , 1 ) , ( 1 , 1 , 0 ) , ( 1 , 1 , 1 ) }
Let Tn (e1k, e2j, e3i) = Fn (ek, ej, ei) = Skji
where k, j, i ∈ (1, 2, 3). In other words, the constant Skji is a method value at one of the eight possible triples of basis vectors, each vector vk ∈ Vk = M3 can be expressed as a bilinear combination of the basis vectors.
v k = k = 1 3   v j k   e j k = v j 1   ×   ( e j 1 ,   ,   e jdj ) + v j 2   ×   ( e j 1 ,   ,   e jdj ) + v j 3   ×   ( e j 1 ,   ,   e jdj ) = v j 1 × ( E 1 , E 2 , E 3 ) + v j 2 × ( E 1 , E 2 , E 3 ) + v j 3 × ( E 1 , E 2 , E 3 ) = v j 1 × { ( 0 , 0 , 0 ) , ( 0 , 0 , 1 ) , ( 0 , 1 , 0 ) , ( 0 , 1 , 1 ) , ( 1 , 0 , 0 ) , ( 1 , 0 , 1 ) , ( 1 , 1 , 0 ) , ( 1 , 1 , 1 ) } + v j 2 × { ( 0 , 0 , 0 ) , ( 0 , 0 , 1 ) , ( 0 , 1 , 0 ) , ( 0 , 1 , 1 ) , ( 1 , 0 , 0 ) , ( 1 , 0 , 1 ) , ( 1 , 1 , 0 ) , ( 1 , 1 , 1 ) } + v j 3 × { ( 0 , 0 , 0 ) , ( 0 , 0 , 1 ) , ( 0 , 1 , 0 ) , ( 0 , 1 , 1 ) , ( 1 , 0 , 0 ) , ( 1 , 0 , 1 ) , ( 1 , 1 , 0 ) , ( 1 , 1 , 1 ) }
The method value at an arbitrary collection of three vectors vj ∈ M3 can be expressed as
T n   ( v 1 ,   v 2 ,   v 3 ) = k = 1 3 j = 1 3 k = 1 3 S kji   v 1 k v 2 j   v 3 i
The fundamental benefits of chaotic functions are confrontation to trifling alterations in the preliminary conditions and constraints, unified physiognomies, periodicity, indefinite, consistent gesticulations with extensive stages of instant and replication of unique fashion. To achieve reliable info privacy and veracity, a piecewise linear map and three-dimensional chaotic maps are employed for the production of hash value and encipherment standards.
The two-dimensional CATCM and 3-D maps are defined as:
E i ( k + 1 E j ( k + 1 = T n E i ( k E j ( k mod n = V i 1 V i 2 V j 1 V j 2 M 1 ( k M 2 ( k mod n
E i ( k + 1 E i ( k + 1 = T n 1 e j 1 e j 2 1 + e j 1 e j 2 M 1 ( k M 2 ( k mod n
M i ( c + 1 M j ( c + 1 M k ( c + 1 = T M i ( c + 1 M j ( c + 1 M k ( c + 1 mod n
T n = T ij T ik T ji T jk T ki T kj   is   a   3 × 3   matrices
T ij = 1 v i j 0 0 1 + v i j e i j 0 0 0 1           T ik = 1 0 v i k 0 1 0 e i k 0 1 + v i k e i k
T ji = 1 0 0 v i j 1 + v i j e i j 0 0 0 1         T jk = 1 0 0 0 1 v j k 0 1 + v j k e j k 1
T ki = 1 0 e i k 0 1 0 v i k 0 1 + v i k e i k   T kj = 1 0 0 0 1 1 + v i k e i k 0 v j k 1
In Figure 1, we used a novel Tinkerbelle map [] which is a discrete-time chaotic randomized system given by
Pi+1 = P2i − Q2i + X1Pi + Y1Qi
Qi+1 = 2PiQi + X2Pi + Y2Qi
Figure 1. Tinkerbelle Chaotic randomization with X1 = 0.912 X2 = −0.613. Y1 = 2.01 Y2 = −0.52. Used starting values of P0 = −0.712 and Q0 = −0.63.
Some commonly used inputs of X1 X2 Y1 and Y2 are
X1 = 0.912 X2 = −0.613 Y1 = 2.01 Y2 = −0.52
X1 = 0.351 X2 = 0.601 Y1 = 2.13 Y2 = 0.26
The novel Tinkerbelle map can also be represented in the form of time bands, subsequently a definite count of recapitulations. Any point upon this map to the accurate will catch itself at its initial position. This map could produce a chaotic set of values, which is resolved steadily by the first set of values p, Q, and set of values X and Y. The askew Tinkerbelle map is cast-off to produce the extremely chaotic set of tenets for every repetitive procedure which is used in hash-based functions. To enhance the complexity of novel Tinkerbelle map we employed a novel slant bivouac map which is defined as follows:
f Ø b = b Ø , 0.7 < Ø < 1 b 1 Ø 1 , Ø < b 1
The transposed method of the slant bivouac map is specified as
f Ø 1 b = Ø X   or   f Ø 1 b = 1 + Ø 1 b 1
In the non-linear vibrant scheme, commotion is an omnipresent portent. The Lyapunov characteristic exponent could be shown in many nonlinear maps and the statistical quantity of them may reproduce the gradation of energy of the contiguous focal point.
Hybrid Chaotic     model = P i = E j ( Q i f Ø b Q i = P i f Ø 1 b + T n P q ˙ + Q p = P i Q i bf Ø 1 b
Hybrid Chaotic   Chin   model = P j = F n ( Q i P i Q j = Q i V k + d j P i + c i Q i R j = P i Q i f Ø 1 b T n Q r ˙ + R q ˙ = R i + f Ø b
Hybrid Chaotic   Roslier   model = P k = Q j R j Q k = P k + d j Q r + V s R k = b + P j R j R p ˙ + P r ˙ = c k F n + f Ø 1 b   T n
Hybrid-chaotic models with exponential Lyapunov exponent of usually produce many multifarious edifices and chaotic characteristics over the chaotic schemes with an exponential Lyapunov exponent. Though, firm hybrid-chaotic models can easily break with specific variable count’s predictive tools since their gradation of energy is meeker and the degree of non-linear tensor productive variable count is deprived. Consequently, hybrid-chaotic models are necessary to enhance the security and integrity for the user’s sensitive info, cloud frameworks, and apps with superior intricacy.

Proposed Hybrid QKD Standard for Big Cloud Data Security

The proposed hybrid QKD [] standard with frenzied reliability needs two distinct transmission links: are the quantum link and a regular conventional link. At both edges of the source and the target employs a trilinear map-based Tinkerbelle chaotic randomization technique to produce session-wise secret keys along with a group of polarizers to capture the state of cubits. We combined both the Ciphered text Policy-based ABE standard and a trilinear-based hybrid QKD validation practice [,] cast-off in this proposal to produce a joint validated key without the involvement of a third party. The elementary configuration of the planned prototype is shown in Figure 2.
Figure 2. Proposed Model QHCP-ABE.
The fundamental step-by-step procedure of the planned key production based on the QKD procedure shown in Figure 3 is abridged beneath:
Figure 3. Proposed Polygon Polarization Based QHCP-ABE.
Step 1: Cloud Consumer 1 (CC1) selects a group of trilinear cyclic vector spaces with the help of a chaotic session-wise group key generator [].
Step 2: CC1 produces a state of polarizations with the help of askew Tinkerbelle base info. Here, different trilinear-based SOPs are utilized to produce the initial trilinear vector spaces.
Step 3: CC1 directs the calculated state of polarized info to Cloud Consumer 2 (CC2).
Step 4: CC2 produces an arbitrary base with the help of the trilinear structure-based SOPs.
Step 5: CC2 computes the received polarized info with the help of the CC1 polarized info.
Step 6: CC3 produces the secret key and directs it back to CC1.
Step 7: At last, the mutually shared key is produced at both sides, and that final randomized key is used for the encipherment and decipherment process. This common key is cast off to produce chaos-based pseudo-randomization in the encipherment and decipherment stages over the big cloud data security [].
The session-wise random secret key with the help of QKD is passed to the Hybrid Quantum-based Ciphered text Policy-based ABE standard of the official cloud clients. The Hybrid Quantum based Ciphered text Policy based ABE, along with Chaos-based uprightness, comprises some essential procedures such as Key Production, Initialization, Encipherment, and Decipherment elaborated underneath.
A.
Initialization Stage: In this stage, we produce pooled randomized quantum key (PRQK), main key (MK), and attributes for public key (PK). Let F be the trilinear cyclic group with an order of prime p which satisfies trilinear map and non-degeneracy property such that Ø1 and Ø2 ∈ Fp so that the main key and public key are produced as
PK = {T_Chaotic(HQKD(PRQK)), Fp(Vsn), k, x = kØ2, y = k1/Ø1, Tn (enk)}
Mk = {Ø1, kØ2, Vk}
B.
Enciphered Stage: The encipherment process practices the primary consumers’ text (Ct) to produce the associated ciphered text. As part of the encipherment process, the Ct is enciphered with help of MK and PK and then design a bit vector. Opening with the root point of rp–integeral modulo Z*, this technique chooses an arbitrary value av and shows E(rp,0) = av.
It arrays E(Ct,0) = E(rpnode(rp_value, Pk)) for the rp_value midway plugs. If Ln is a group of leaf nodes in the tree hierarchy of admittance, then the ciphered text is generated on the base of the input tree admittance Ta as:
CipherText(Ct) = {C1 = MK. E(Tn (enk))Ø2.rp, Fp, Cn = Ctrp
∀ rp ∈ R: Cn = k E(rpnode(rp_value, Pk)),
C1n = Lyapunove Exp(Ct)(rpnode(rp_value, Pk))}
C.
Key Production Stage: In this stage, we gathered the set of big cloud data consumers’ attributes (Cattrib) to produce the peculiar random key (PrK). This stage needs a group of Cattrib, HQKD (PrK) attributes for the initial inputs and produces a furtive key as the outcome. This process selects the randomized value called Slant Bivouac group of values Sb and rand for every user characteristic uc, which is elected as the shared key variable in Z*p.
PrK = {Sb = k(Ø2+rand)/Ø1, Sb(i) = krand*H(j).randi, Sb(i) = krandi}
D.
Decrypt Scheme: It receipts responses individual significant (Sk, group of attributes (Cattrib)), ciphered text (Ct), access admittance edifice (Ta) combined, and Peculiar random key PrK.

5. Experimental Results

The principal goal of the uprightness validation approach is to enhance the safety of the big cloud consumer’s info. In the investigational findings, diversified kinds of multimedia data, such as a transcript, picture, audiovisual, json, msi, etc., are considered to calculate the hashed value with random hash proportions. Conventional enciphered models are sovereign with respect to uprightness validation because more memory is required for computation and time-band such as logistic logarithm, GPU-centric program design and huge volume-based revocation approaches. Many of the conventional hash-based models have fewer complex computations for consumers to generate their identifiable cryptographic credentials. The primary use of the randomization comportment over the hash-based approaches is to produce chaotic behavior and needing less time to produce complex identifiable cryptographic credentials with less size for the uprightness validation. It is not good practice to reveal the personal key. A portion of symmetrical encipherment methods such as global-key standards distribute their public key deprived of data integrity and confidentiality. Figure 4 illustrates the official cloud consumers have to choose the content for truthfulness validation.
Figure 4. User selected file for reliability validation.
We used the AWS orders and S3 service to simulate and produce all the investigational findings. The cloud consumer conformations are 16 GB RAM, an Intel(R) CPU 3.5 GHz, and the Windows 10 or Ubuntu OS. For a successful operation of this proposed approach, we used some Java standard libraries, such as Java Quantum APIs, Java core layer low-level API, cloud base simulator, local host simulators, java.util.random, ACL, RBAC, and ABAC castoff as exterior libraries for progress.
The investigational findings in Table 1, CPABE, KPABE, and FHABE models are implemented over around 3000 KB of users’ info volume with support of MD-5, SHA-256, and SHA-512, and the minimum computational periods are tabularized. Projected models are measured to be superior to the conventional models as it is perceived that the computational period is around 40% lesser as per the above-mentioned tabularized info.
Table 1. Analysis of different Hash-based Encryption Techniques.
As per Table 2 results, it is evidently clear that planned Hybrid QCP-BE standard took a smaller amount of cloud info space even though the consumers’ info volume is equivalent to the conventional standards of the size of 5000 KB. Therefore, we can conclude that even the size of the input info rises, our standard model devours a very small volume of cloud space as compared with conventional standards.
Table 2. Memory occupancy efficacy of proposed standard vs. conventional ABE standards.
Table 3 signifies the relationship between the proposed model with conventional hash models and observed that the planned standard took very small execution time as related to the conventional standards.
Table 3. Relative investigational findings of planned reliable hybrid quantum CPABE over the conventional enciphered standards w.r.t execution time as parameter.
Figure 5 exemplifies the comparative analysis of various Hash-based Encryption Techniques with the proposed one.
Figure 5. Relative investigational analysis of processing time band of planned standard over the conventional standards on dissimilar datasets.
Figure 6 exemplifies the comparative analysis of the memory occupancy efficacy of the proposed standard with respect to conventional ABE standards.
Figure 6. Relative investigational analysis of processing time band of planned standard over the conventional standards on dissimilar datasets.
Figure 7 exemplifies the relationship between the proposed model with conventional hash models and observed that the planned standard took very small execution time as related to the conventional standards.
Figure 7. Relative investigational analysis of processing time band of planned standard over the conventional standards on dissimilar datasets.
Figure 8 exemplifies the comparative analysis of the Hybrid QCPABE over the conventional models with dissimilar processing time (m/s). As displayed in Figure 5, it is observed that the presented standard took less processing time as linked to the conventional standards w.r.t diversified structured and unstructured data formats.
Figure 8. Relative investigational analysis of processing time band of planned standard over the conventional standards on with dissimilar datasets.

6. Conclusions and Future Scope

In the conventional ABE models, many of the models considered their input user attributes are text-based info and used fixed values for key production, consumer text encipherment and decipherment procedure. To address the existing problems, we proposed a new trilinear Tinkerbelle chaotic map-centric hash technique applied to enhance the cloud consumer security of the proposed hybrid quantum-based CPABE standard. In the planned standard, consumer’s attributes are any type, and those are protected with the help of the trilinear Tinkerbelle chaotic function for key setup, cloud consumer text encipherment, and decipherment procedure. Investigational findings conclude that the projected model is working well to achieve big cloud consumers’ sensitive data integrity and privacy with less enciphered, deciphered, and key production time as compared with the conventional ABE models. Our proposed model used both structured and unstructured big cloud clinical data as input so that the simulated experimental results conclude that the proposal has precise, resulting in approximately 92% correctness of bit hash change and approximately 96% correctness of chaotic dynamic key production, enciphered and deciphered time as compared with conventional standards from the literature. In the future, this research contribution may extended over decentralized blockchain apps, establish secure communication among IoT and IIoT devices along with client service level validation.

Author Contributions

Conceptualization, K.K.S.; methodology, K.K.S.; software, A.N. and S.J.; validation, K.K.S. and G.D.; formal analysis, K.K.S. and W.V.; investigation, K.K.S. and G.D.; resources, G.D.; data curation, K.K.S.; writing—original draft preparation, K.K.S.; writing—review and editing, G.D., Y.H. and J.H.A.; visualization, K.K.S., A.N. and S.J.; supervision, G.D., Y.H. and J.H.A.; project administration, Y.H. and J.H.A.; funding acquisition, Y.H. and J.H.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data will be available from first author upon request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Qian, L.; Luo, Z.; Du, Y.; Guo, L. Cloud Computing: An Overview. In Cloud Computing, Proceedings of the IEEE International Conference on Cloud Computing, Beijing, China, 1–4 December 2009; Springer: Berlin/Heidelberg, Germany, 2009. [Google Scholar]
  2. Shamir, A. Identity-Based Cryptosystems and Signature Schemes. In Advances in Cryptology, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, 9–11 April 1984; Springer: Berlin/Heidelberg, Germany, 1984. [Google Scholar]
  3. Boneh, D.; Franklin, M. Identity-Based Encryption from the Weil pairing. In Advances in Cryptology—CRYPTO 2001, Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2001; Springer: Berlin/Heidelberg, Germany, 2001. [Google Scholar]
  4. Amit, S.; Waters, B. Fuzzy Identity-Based Encryption. In Advances in Cryptology—EUROCRYPT 2005, Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 22–26 May 2005; Springer: Berlin/Heidelberg, Germany, 2005. [Google Scholar]
  5. Waters, B. Efficient Identity-Based Encryption without Random Oracles. In Advances in Cryptology—EUROCRYPT 2005, Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 22–26 May 2005; Springer: Berlin/Heidelberg, Germany, 2005. [Google Scholar]
  6. Xavier, B.; Waters, B. Anonymous Hierarchical Identity-Based Encryption (without Random Oracles). In Advances in Cryptology—CRYPTO 2006, Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 20–24 August 2006; Springer: Berlin/Heidelberg, Germany, 2006. [Google Scholar]
  7. Han, J.; Susilo, W.; Mu, Y. Identity-based data storage in cloud computing. Future Gener. Comput. Syst. 2013, 29, 673–681. [Google Scholar] [CrossRef]
  8. Bethencourt, J.; Sahai, A.; Waters, B. Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP’07), Berkeley, CA, USA, 20–23 May 2007. [Google Scholar]
  9. Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October–3 November 2006. [Google Scholar]
  10. Lewko, A.; Waters, B. Decentralizing attribute-based encryption. In Advances in Cryptology—EUROCRYPT 2011, Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, 15–19 May 2011; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
  11. Zhuang, Z.; Zhang, J.; Geng, W. Analysis and Optimization to an NFC Security Authentication Algorithm Based on Hash Functions. In Proceedings of the International Conference on Wireless Communication and Mesh Network, Wuhan, China, 13–14 December 2014; pp. 240–245. [Google Scholar]
  12. Pei, S.L.; Ma, Z.L.; Li, Y.; Ma, Y.Z. AKA Security Algorithm Design Based on Chaotic Mapping. In Proceedings of the 2nd International Conference on Advanced Computer Control, Shenyang, China, 27–29 March 2010; Volume 5, pp. 451–453. [Google Scholar]
  13. Wang, G.; Liu, Q.; Wu, J. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In Proceedings of the ACM Conference—Computer and Communications Security (ACM CCS), Chicago, IL, USA, 4–8 October 2010; pp. 4–8. [Google Scholar]
  14. Da Lio, B.; Bacco, D.; Ding, Y.; Cozzolino, D.; Dalgaard, K.; Rottwitt, K.; Oxenl, L.K. Two-Dimensional Quantum Key Distribution (QKD) Protocol for Increased Key Rate Fiber-Based Quantum Communications. In Proceedings of the 2017 European Conference on Optical Communication (ECOC), Gothenburg, Sweden, 17–21 September 2017; pp. 1–3. [Google Scholar]
  15. Wadhwa, S.; Ahmad, M.; Vijay, H. Chaotic hash function based plain-image dependent block ciphering technique. In Proceedings of the 2016 International Conference on Advances in Computing, Communications, and Informatics (ICACCI), Jaipur, India, 21–24 September 2016; pp. 633–637. [Google Scholar]
  16. Xiao, D.; Liao, X.; Wang, Y. Parallel keyed hash function construction based on chaotic neural network. Neurocomputing 2009, 72, 2288–2296. [Google Scholar] [CrossRef]
  17. Yang, X.; Layuan, L.; Chuanhui, C. Application research-based ant colony optimization for WMN. In Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, China, 22–24 September 2006; pp. 1–4. [Google Scholar]
  18. Xiao, Y.; Zhao, Q.; Kaku, I.; Mladenovic, N. Variable neighbourhood simulated annealing algorithm for capacitated vehicle routing problems. Eng. Optim. 2014, 46, 562–579. [Google Scholar] [CrossRef]
  19. Jung, T.; Li, X.; Wan, Z.; Wan, M. Privacy preserving cloud data access with multi-authorities. In Proceedings of the 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC), San Diego, CA, USA, 6–8 December 2013; pp. 2625–2633. [Google Scholar]
  20. Fei, P.; Shui-Sheng, Q. One-way hash functions based on iterated chaotic systems. In Proceedings of the 2007 International Conference on Communications, Circuits and Systems, Kokura, Japan, 11–13 July 2007; pp. 1070–1074. [Google Scholar]
  21. Xiong, A.; Gan, Q.; He, X.; Zhao, Q. An Integrity Based Encryption of CP-ABE Scheme in Cloud Storage; Springer: Berlin/Heidelberg, Germany, 2016; pp. 345–349. [Google Scholar]
  22. Wang, Y.; Zhang, D.; Zhong, H. Multi-authority Based Weighted Attribute Encryption Scheme in Cloud Computing. In Proceedings of the 10th International Conference on Natural Computation, Xiamen, China, 19–21 August 2014; pp. 1033–1038. [Google Scholar]
  23. Mo, T.L.; Lin, F. A dynamic re-encrypted ciphertext-policy attributed-based encryption scheme for cloud storage. In Proceedings of the 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Guangdong, China, 8–10 November 2014; pp. 14–19. [Google Scholar]
  24. Chandar, P.P.; Muthuraman, D.; Rathinraj, M. Hierarchical Attribute Based Proxy Re-Encryption Access Control in Cloud Computing. In Proceedings of the International Conference on Circuit, Power and Computing Technologies [ICCPCT], Nagercoil, India, 20–21 March 2014; pp. 1565–1570. [Google Scholar]
  25. Kumar, R.; Mahajan, G. A novel framework for secure file transmission using modified AES and MD5 algorithms. Int. J. Inf. Comput. Secur. 2015, 7, 91–112. [Google Scholar] [CrossRef]
  26. Singamaneni, K.K.; Ramana, K.; Dhiman, G.; Singh, S.; Yoon, B. A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data. Sensors 2021, 21, 7300. [Google Scholar] [CrossRef]
  27. Singamaneni, K.K.; Naidu, P. Secure key management in cloud environment using quantum cryptography. Ing. Syst. D’inf. 2018, 23, 213–222. [Google Scholar] [CrossRef]
  28. Chase, M.; Chow, S.S.M. Improving Privacy and Security in Multiauthority Attribute-Based Encryption. In Proceedings of the 16th ACM Conference on Computer and Communications Security 2009, Chicago, IL, USA, 9–13 November 2009; pp. 121–130. [Google Scholar]
  29. Gao, L.; Wang, X.; Zhang, W. Chaotic Hash Function Based on Tandem-DM Construction. In Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 16–18 November 2011; pp. 1745–1749. [Google Scholar]
  30. Zavattoni, E.; Perez, L.D.; Mitsunari, S.; Sanchez-Ramirez, A.; Teruya, T.; Rodriguez-Henriquez, F. Software implementation of an attribute-based encryption scheme. IEEE Trans. Comput. 2015, 64, 1429–1441. [Google Scholar] [CrossRef]
  31. Jayant, D.B.; Swapnaja, A.U.; Sulabha, S.A.; Dattatray, G.M. Analysis of dac mac rbac access control based models for security. Int. J. Comput. Appl. 2014, 104, 6–13. [Google Scholar]
  32. Pirretti, M.; Traynor, P.; McDaniel, P.; Waters, B. Secure attribute-based systems. In Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VI, USA, 30 October–3 November 2006; ACM Press: New York, NY, USA, 2006; pp. 99–112. [Google Scholar]
  33. Singamaneni, K.K.; Naidu, P.S.; Kumar, P.V.S. Efficient quantum cryptography technique for key distribution. J. Eur. Syst. Autom. 2018, 51, 283. [Google Scholar] [CrossRef]
  34. Singamaneni, K.K.; Naidu, P.S. IBLIND Quantum Computing and HASBE for Secure Cloud Data Storage and Accessing. Rev. D’Intell. Artif. 2019, 33, 33–37. [Google Scholar] [CrossRef]
  35. Singamaneni, K.K.; Juneja, A.; Abd-Elnaby, M.; Gulati, K.; Kotecha, K.; Kumar, A.S. An Enhanced Dynamic Nonlinear Polynomial Integrity-Based QHCP-ABE Framework for Big Data Privacy and Security. Secur. Commun. Netw. 2022, 2022, 4206000. [Google Scholar] [CrossRef]
  36. Singamaneni, K.K.; Dhiman, G.; Juneja, S.; Muhammad, G.; AlQahtani, S.A.; Zaki, J. A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks. Sensors 2022, 22, 6741. [Google Scholar] [CrossRef]
  37. Singamaneni, K.K.; Naidu, P.S. An efficient quantum hash-based CP-ABE framework on cloud storage data. Int. J. Adv. Intell. Paradig. 2022, 22, 336–347. [Google Scholar] [CrossRef]
  38. Singamaneni, K.K.; Naidu, P.S. An improved dynamic polynomial integrity based QCP-ABE framework on large cloud data security. Int. J. Knowl. Based Intell. Eng. Syst. 2020, 24, 145–156. [Google Scholar] [CrossRef]
  39. Wang, T.; Yang, Q.; Shen, X.; Gadekallu, T.R.; Wang, W.; Dev, K. A privacy-enhanced retrieval technology for the cloud-assisted internet of things. IEEE Trans. Ind. Inform. 2021, 18, 4981–4989. [Google Scholar] [CrossRef]
  40. Kumar, R.; Tripathi, R.; Marchang, N.; Srivastava, G.; Gadekallu, T.R.; Xiong, N.N. A secured distributed detection system based on IPFS and blockchain for industrial image and video data security. J. Parallel Distrib. Comput. 2021, 152, 128–143. [Google Scholar] [CrossRef]
  41. Reddy, G.T.; Sudheer, K.; Rajesh, K.; Lakshmanna, K. Employing data mining on highly secured private clouds for implementing a security-asa-service framework. J. Theor. Appl. Inf. Technol. 2014, 59, 317–326. [Google Scholar]
  42. Nauman, A.; Jamshed, M.A.; Ali, R.; Cengiz, K.; Zulqarnain; Kim, S.W. Reinforcement learning-enabled Intelligent Device-to-Device (I-D2D) communication in Narrowband Internet of Things (NB-IoT). Comput. Commun. 2021, 176, 13–22. [Google Scholar] [CrossRef]
  43. Zhao, Y.; Zhang, X.; Xie, X.; Ding, Y.; Kumar, S. A verifiable hidden policy CP-ABE with decryption testing scheme and its application in VANET. Trans. Emerg. Telecommun. Technol. 2022, 33, e3785. [Google Scholar] [CrossRef]
  44. Sandhia, G.K.; Raja, S.K. Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography. J. Ambient Intell. Humaniz. Comput. 2022, 13, 3893–3902. [Google Scholar] [CrossRef]
  45. D’Alconzo, G.; Gangemi, A. TRIFORS: LINKable Trilinear Forms Ring Signature. Cryptol. Eprint Arch. 2022. Available online: ia.cr/2022/1170 (accessed on 24 September 2021).
  46. Dhopavkar, T.A.; Nayak, S.K.; Roy, S. IETD: A novel image encryption technique using Tinkerbell map and Duffing map for IoT applications. Multimed. Tools Appl. 2022. [Google Scholar] [CrossRef]
  47. Uppal, M.; Gupta, D.; Juneja, S.; Dhiman, G.; Kautish, S. Cloud-based fault prediction using IoT in office automation for improvisation of health of employees. J. Healthc. Eng. 2021, 2021, 8106467. [Google Scholar] [CrossRef]
  48. Juneja, S.; Jain, S.; Suneja, A.; Kaur, G.; Alharbi, Y.; Alferaidi, A.; Alharbi, A.; Viriyasitavat, W.; Dhaiman, G. Gender and age classification enabled blockschain security mechanism for assisting mobile application. IETE J. Res. 2021. [Google Scholar] [CrossRef]
  49. Dhiman, G.; Juneja, S.; Mohafez, H.; El-Bayoumy, I.; Sharma, L.K.; Hadizadeh, M.; Aminul Islam, M.; Viriyasitavat, W.; Khandaker, M.U. Federated learning approach to protect healthcare data over big data scenario. Sustainability 2022, 14, 2500. [Google Scholar] [CrossRef]
  50. Dhiman, G.; Rashid, J.; Kim, J.; Juneja, S.; Viriyasitavat, W.; Gulati, K. Privacy for healthcare data using the byzantine consensus method. IETE J. Res. 2022. [Google Scholar] [CrossRef]
  51. Mittal, S.; Bansal, A.; Gupta, D.; Juneja, S.; Turabieh, H.; Elarabawy, M.M.; Sharma, A.; Bitsue, Z.K. Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health. Comput. Intell. Neurosci. 2022, 2022, 7016554. [Google Scholar] [CrossRef]
  52. Gupta, N.; Gupta, K.; Gupta, D.; Juneja, S.; Turabieh, H.; Dhiman, G.; Kautish, S.; Viriyasitavat, W. Enhanced virtualization-based dynamic bin-packing optimized energy management solution for heterogeneous clouds. Math. Probl. Eng. 2022, 2022, 8734198. [Google Scholar] [CrossRef]
  53. Sharma, S.; Gupta, K.; Gupta, D.; Juneja, S.; Turabieh, H.; Sharma, S. SWOT: A Hybrid Hardware-Based Approach for Robust Fault-Tolerant Framework in a Smart Day Care. Secur. Commun. Netw. 2022, 2022, 2939469. [Google Scholar] [CrossRef]
  54. Juneja, S.; Juneja, A.; Bali, V.; Upadhyay, H. Cyber Security: An Approach to Secure IoT from Cyber Attacks Using Deep Learning. In Industry 4.0, AI, and Data Science; CRC Press: Boca Raton, FL, USA, 2021; pp. 135–146. [Google Scholar]
  55. Sarker, I.H.; Abushark, Y.B.; Alsolami, F.; Khan, A.I. Intrudtree: A machine learning based cyber security intrusion detection model. Symmetry 2020, 12, 754. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.