A Novel Access Control Based Privacy Preserving Model To Evaluate Multiuser Authentication Access Control In Secure Cloud Environment
DOI:
https://doi.org/10.64252/2wgb3g98Keywords:
Privacy Preservation, Data Security, Cloud Data Sharing, Attribute Based Encryption, Broadcast Group Multi Key Management, Multi User Data Sharing, Shamir Secret Sharing Scheme.Abstract
Cloud computing has become a new standard in computer architecture, allowing multiple users to remotely access scalable services and store data in the cloud. Small and Medium-sized Enterprises (SMEs) benefit from cloud-based solutions for project management, collaboration, and other tasks, offering significant savings and increased productivity, especially with budget constraints. However, concerns over data security and privacy arise when SMEs entrust sensitive information to Cloud Service Providers (CSPs) that may not be within the same trusted domains. A promising solution to address these concerns involves the use of cryptographic techniques, particularly by restricting access to decryption keys solely to authorized users. This effectively safeguards sensitive multi-user data from CSPs. As cloud computing expands, secure and efficient multi-user data sharing has become essential, given the vast amounts of data stored in the cloud. Ensuring data privacy in multi-party storage is critical for protecting shared data, and methods like concealing the server's address sequence during frequent data access can make it harder to trace data access. To meet the growing demand for scalable, adaptable, and reliable access control in distributed work environments, a novel approach called the Novel Access Control-based Privacy Preserving Approach (NACPPA) has been developed. This approach integrates Attribute-Based Encryption (ABE) and the Broadcast Group Multi-Key Policy (BGKM), fulfilling the need for efficient Group Key Management (GKM) while maintaining the integrity of existing user secret shares without requiring modifications. Security evaluations comparing the proposed method to alternative solutions demonstrate its effectiveness in preserving privacy and ensuring secure access control.