ADVANCED ATTRIBUTE BASED SEARCHABLE ENCRYPTION SCHEME FOR CLOUD INTRUSION DECTION SERVICE

Authors

  • Katuboina N V Bala Ganesh Pavan Kumar
  • Kola Sangeetha Supriya
  • Devarasetti Prasad
  • Anumula Sruthi

Keywords:

HealthCare, Fog computing, Cloud computing, Security, Sensitive data, Patient information, Attribute-based signatures, Attribute-based encryption, proxy server, encryption

Abstract

The searchable encryption (SE) is used structured encryption, which has been analysis secure cloud storage system stored information and encryption keys are usually managed by the cloud provider. New method of the data access control for Industrial Internet of Things (IIoT) applications is integrated industrial system contains all kinds of data with rigorous access permissions. We propose a proxy re encryption technique which performs a two level encryption before storing the actual data into the cloud. We have used AES (Advanced Encryption standard) technique to encrypt data as well as decrypt data this paper also introduce the Cloud Intrusion Detection Service (CIDS) which detect the different attack and fire the alert to other cloud user. We have extracted different features like extra security forward secrecy, confidentiality, and secure data sharing. In this paper we used RS- IBE (Revocable Storage Identity- Based Encryption) algorithm for the security as well as recognized all members of system. To ensure the security of data we proposed a method by implementing RSA algorithm. The trusted authority module receives encrypted file using AES Algorithm from the data owner and computes hash value using MD-5 algorithm. It stores key in its database which will be used during the dynamic operations and to determine the cheating party in the system (CSP or Owner). Trusted authority send file to CSP module to store on cloud.

Downloads

Published

2025-05-13

How to Cite

Katuboina N V Bala Ganesh Pavan Kumar, Kola Sangeetha Supriya, Devarasetti Prasad, & Anumula Sruthi. (2025). ADVANCED ATTRIBUTE BASED SEARCHABLE ENCRYPTION SCHEME FOR CLOUD INTRUSION DECTION SERVICE. Utilitas Mathematica, 122(1), 768–779. Retrieved from https://utilitasmathematica.com/index.php/Index/article/view/2197

Citation Check

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.