Computer Systems Science & Engineering DOI:10.32604/csse.2022.017597 | |
Article |
Repeated Attribute Optimization for Big Data Encryption
Department of Computer Science, College of Arts and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia
*Corresponding Author: Abdalla Alameen. Email: a.alameen@psau.edu.sa
Received: 04 February 2021; Accepted: 09 April 2021
Abstract: Big data denotes the variety, velocity, and massive volume of data. Existing databases are unsuitable to store big data owing to its high volume. Cloud computing is an optimal solution to process and store big data. However, the significant issue lies in handling access control and privacy, wherein the data should be encrypted and unauthorized user access must be restricted through efficient access control. Attribute-based encryption (ABE) permits users to encrypt and decrypt data. However, for the policy to work in practical scenarios, the attributes must be repeated. In the case of specific policies, it is not possible to avoid attribute repetition even after the application of Boolean optimization approaches to obtain a Boolean formula. For these policies, there exists a variety of evaluated secret shares for the repeated attributes. Therefore, the calculation of cipher text for these irreducible policies seems to be lengthy and computationally intensive. To address this problem, an improved meta-heuristic-based repeated attributes optimization on cipher-text policy-ABE (CP-ABE) is developed in this study. Here, the improved meta-heuristic concept is developed in the encryption phase, which returns the optimized single share value of each repeated attribute after considering all the attribute shares. The optimization process not only minimizes the encryption cost but also the communication cost. Herein, the improved sun flower optimization (SFO), called the newly updated SFO (NU-SFO) is used to perform the repeated attribute optimization in CP-ABE. Finally, the performance evaluation confirms the reliability and robustness of the developed scheme through comparisons with traditional constructions.
Keywords: Big data; repeated attribute optimization; cipher text policy; encryption
Owing to the enhanced application of digitization and internet technology, data have become an important factor in organizational growth. Consequently, a novel paradigm known as big data, which refers to data that is huge in size, has emerged. Data can be semi-structured, unstructured, or structured. The veracity denotes the data, which is produced in a rapid format. Therefore, data must be gathered and processed in a rapid manner [1]. Recently, cloud computing technology has evolved as a quick development [2] and is considered as a significant area in computer science. It offers storage and computing services that help clients handle expanded data sharing. Data are saved to remote servers using encryption. Therefore, they are not visible to malicious servers or unauthorized users. Moreover, digital content is safeguarded through access control. Although cloud computing offers a wide variety of benefits, businesses refrain from choosing this solution owing to privacy and security concerns. The data denotes storing it outside the server, which is untrustworthy. Cloud service providers (CSPs) disclose data to unauthorized users or access private data for business reasons. Therefore, data must be encrypted to ensure privacy. However, even after encryption, data remain visible to all the users. Consequently, users must be permitted to access only those data they are authorized to access [3].
Big data storage should consider user access control and privacy [4]. These issues are initially addressed by attribute-based encryption (ABE) [5]. Here, user identity is described using some attributes, which offer fine-grained access control and data privacy [6]. However, using these directly for access control and big data privacy is a complex task because it involves huge decryption and encryption computation costs arising from the necessity of exorbitant pairing operations and the size of the cipher-text, respectively. This overhead is minimized by outsourcing heavy decryption and encryption computations [7]. The CP-ABE restricts unauthorized users from using the data saved on remote servers. The CP-ABE schemes [8–11] were developed with distinct access structures such as the linear secret sharing scheme (LSSS) structure, AND gate with negative and positive attributes, AND gate, tree structure, and threshold [12–15]. However, they do not offer big data access control in a direct manner, owing to high computation cost. Recently, big data access control schemes [16,17] comprising LSSS were developed. Therefore, it is necessary to model a CP-ABE scheme such that minimum computation overhead is incurred [18].
The main contributions of this study are listed below.
• An enhanced CP-ABE was developed for addressing the computation efforts and calculations of cipher text for the irreducible policies.
• A new optimization algorithm, NU-SFO, was developed, which optimizes the random encryption exponent and the random vector, thereby minimizing the communication and encryption costs.
• The enhanced meta-heuristic concept was employed in the encryption phase by returning the optimized single share value for every repeated attribute after considering the entire attribute shares.
• The performance of the proposed NU-SFO-CP-ABE was validated against traditional algorithms in terms of encryption time analysis, decryption time analysis, and key generation analysis.
This paper is organized as follows. Section I provides an introduction to the CP-ABE for big data security. The works related to CP-ABE in literature are presented in Section II. Section III explains the system and security models of the recommended encryption process. Section IV describes the meta-heuristic-based CP-ABE in big data. The results of the experiments and allied discussions are provided in Section V. Section VI concludes the paper.
Premkamal et al. [19] have developed a novel CP-ABE for the access control and privacy of big data. Their scheme minimizes the computation overhead of decryption and encryption by outsourcing large computations. Furthermore, it checks the correctness of data in the outsourced computations. Additionally, it restricts data access for user groups, which is required for commercial applications. In terms of security analysis, this scheme proves to be secure against proxy, collusion, and chosen plain-text attacks. Furthermore, a performance analysis demonstrated the effectiveness of this scheme. Chen et al. [20] have developed an efficient extended file hierarchy files CP-ABE scheme (EFH-CP-ABE). This scheme is suitable for big companies and institutions comprising various hierarchical sectors because it saves computation cost and storage space. Moreover, this solution achieved flexible and secure access control for cloud storage users. The final step exhibited superior experimental outcomes. Qin et al. [21] addressed an effective cipher text policy attribute-oriented encryption scheme through the reduction of pairing operations. Security analysis stated that the model was safe from user collusion and chosen-plaintext attacks. This scheme proved to be effective compared to traditional schemes. Guo et al. [22] developed a new framework to handle the access to EHRs. The fine-grained access control related to the EHRs was achieved by leveraging the CP-ABE approach for encrypting the tables released by hospitals, and it was stored in the database using a unique identity of the patient as the primary key. This framework enables distinct users with distinct privileges to search distinct database fields. The control of the field was emphasized inside the database. This scheme was evaluated using the datasets from University of California, Irvine. Li et al. [23] labeled an effective CP-ABE scheme. It minimized the computation cost of the PCSP and the communication and storage costs for the client. Moreover, the developed technique was secured under the bilinear Diffie–Hellman exponent (BDHE). Additionally, it was effective with respect to file and policy updates. Rasori et al. [24] proposed ABE-Cities, wherein the data were sensed from the city location and saved to the cloud in an encrypted format. Users were provided keys to decrypt the sensed data from the authorized zones or paths of the city. The sensors undergo lightweight symmetric-key encryption; therefore, constrained sensor devices such as battery powered motes were used. An expiration date was planned for every key, and the provided key was retracted in an unplanned manner. The existence of IoT gateways was leveraged by an advanced scheme to minimize the computation load. In 2018, Han et al. introduced a novel CP-ABE scheme to protect the attribute values of users against the attribute authority (AA)-oriented on 1-out-of-n oblivious transfer approach. Additionally, an attribute bloom filter was employed to protect the attribute format of the access policy. This scheme produced better security goals; however, there was no improvement in the computation overhead. Challagidad et al. [25] developed an effective multi-authority access control scheme. It comprises hierarchy access structure (HAS) and role hierarchy algorithm (RHA) to protect user data and provide fine-grained access to stored data. The HAS described an access structure for multi-authority and fine-grained access control. The results were effective considering the storage and time consumption for decryption and encryption. The benefits of this scheme are evident when the file count on the cloud storage server increases.
Major security concerns regarding big data are privacy and access control. One of the most adopted privacy algorithms related to big data is the ABE-based algorithm. Literature has suggested various advancements in the ABE-related algorithms; however, most of them face computation overhead while dealing with large data sources. Recently, CP-ABE has become a major research focus for the effective handling of big data in the cloud environment.
3 System and Security Models of the Proposed Encryption Process
The architectural model of a repeated attributes optimization (RAO)-oriented CP-ABE comprises the user, owner, attribute authorities, and CSP. CSP represents an entity that offers storage and computation services. It acts as a semi-trusted entity. AA employs the access control mechanism by providing decryption keys to the users on the basis of user attributes. Each AA produces the secret key and public key parameters. The secret key parameters are employed by the AA to generate user decryption keys on the basis of the attributes of users and the identities owned by them. The entire AA performs in a decentralized format without coordinating among them. Owner describes the resource-conditioned devices that encrypt their data for outsourcing them to the CSP. User is an entity who accesses and retrieves data on the basis of access privilege. Users conspire with one other to access the data that are not entitled to contain in an individual manner. Global Setup
The proposed scheme comprises the following algorithms.
Global Setup
Encrypt
Step-1: Coefficients
Step-2: For the entire different non-repeated attribute names that appear in
Step-3: For each attribute set,
Notations: Attribute shares,
Step-4: To undergo few optimization steps, the algorithm points that attribute group
Step-5: The optimization of the remaining shares attributes,
Every new
Step-6: All the optimized values related to the attribute names in
Next, cipher text CT is transmitted to the cloud server along with
KeyGen
Decrypt
Step-1: If any attribute group ,
Step-2: For user attributes
Step-3: For every attribute in
When the correct
The proposed NU-SFO-based encryption for big data is used to optimize the random encryption component and the random vector to minimize the communication and encryption costs. The SFO [26] approach represents a population-oriented algorithm. It uses pollination and root velocity to provide robustness. It is assumed that every sunflower generates one pollen gamete and reproduces in an individual manner. The next significant nature-oriented optimization is the inverse square law radiation. It states that, “the intensity of the radiation is inversely proportional to the square of the distance.” Otherwise, more the distance between the sun and the plant, less is the heat received. These steps are followed here to achieve the global optimum. The quantity of heat,
Here, the distance between the current best and the plant
The sunflowers in direction
In Eq. (11), the probability of pollination is defined by
Here, the plant count of total population is defined by
The SFO suffers from some shortcomings such as its inability to (i) work with multiple suns, (ii) move in a randomly controlled manner, and (iii) perform random steps in a particular direction. Therefore, the algorithm was improved on the basis of fitness, and it is called NU-SFO. Here, the term,
Here, the terms
The proposed NU-SFO-CP-ABE for enhanced CP-ABE in big data was implemented in MATLAB 2019a. The random encryption component and the random vector were optimized by the same proposed NU-SFO. The population size was considered to be 10, and the maximum iterations were considered to be 100. To prove the superiority of the proposed NU-SFO-CP-ABE, it was compared with several existing optimization algorithms such as GWO-CP-ABE [26], WOA-CP-ABE [27], BOA-CP-ABE [28], and SFO-CP-ABE [29].
The convergence analysis of the recommended NU-SFO-CP-ABE against several heuristic optimization algorithms is presented in Fig. 2. It is evident from the figure that the cost function is greater with the proposed NU-SFO-CP-ABE. At the 6th iteration, the cost function of NU-SFO-CP-ABE is 60%, 33.33%, 81.82%, and 73.91% higher than that of BOA-CP-ABE, WOA-CP-ABE, and GWO-CP-ABE, respectively. For the 10th iteration, the cost function of NU-SFO-CP-ABE is 44.44%, 30%, 54.76%, and 58.54% superior to that of BOA-CP-ABE, WOA-CP-ABE, and GWO-CP-ABE, respectively. Hence, the convergence analysis of NU-SFO-CP-ABE is superior to the traditional approaches.
4.2 Encryption and Decryption Time Analysis
The encryption time analysis of the proposed NU-SFO-CP-ABE in comparison with different heuristic optimization algorithms is presented in Fig. 3. The proposed algorithm has the least encryption cost among all the existing methods, thereby proving its superiority. At the 20th attribute, the encryption time of NU-SFO-CP-ABE is 18.12%, 5.83%, 17.52%, and 9.6% superior to that of BOA-CP-ABE, WOA-CP-ABE, and GWO-CP-ABE, respectively. For the 15th attribute, the encryption time of NU-SFO-CP-ABE is 14.71%, 8.66%, 10.08%, and 13.43% superior to that of BOA-CP-ABE, WOA-CP-ABE, and GWO-CP-ABE, respectively. Similarly, at the 10th attribute, the encryption time of NU-SFO-CP-ABE is 4.10%, 13.97%, 14.60%, and 10% superior to that of BOA-CP-ABE, WOA-CP-ABE, and GWO-CP-ABE, respectively. Overall, the encryption time analysis provides good results with the proposed NU-SFO-CP-ABE compared with all the traditional methods.
The decryption time analysis for big data security with the proposed NU-SFO-CP-ABE compared to the state-of-the-art algorithms is presented in Fig. 4. The proposed NU-SFO-CP-ABE achieves better results than the existing methods, achieving less decryption time with all number of attributes. At the 20th attribute, the decryption time of NU-SFO-CP-ABE is 15.38%, 16.67%, 12%, and 20.29% higher than that of BOA-CP-ABE, WOA-CP-ABE, and GWO-CP-ABE, respectively. For the 15th attribute, the decryption time of NU-SFO-CP-ABE is 8.46%, 9.16%, 3.25%, and 13.14% superior to that of BOA-CP-ABE, WOA-CP-ABE, and GWO-CP-ABE, respectively. Furthermore, for the 10th attribute, the decryption time of NU-SFO-CP-ABE is 6.50%, 4.17%, 7.26%, and 17.27% higher than that of BOA-CP-ABE, WOA-CP-ABE, and GWO-CP-ABE, respectively. Therefore, the decryption time analysis results of the proposed NU-SFO-CP-ABE are better than those of the existing algorithms.
The key generation analysis for the proposed NU-SFO-CP-ABE compared to the traditional algorithms is presented in Fig. 5. In the case of 20 attributes, the results of the proposed NU-SFO-CP-ABE are better than those of the traditional algorithms. For the 20th attribute, the key generation of NU-SFO-CP-ABE is 16.03%, 17.29%, 15.38%, and 14.73% better than that of BOA-CP-ABE, WOA-CP-ABE, and GWO-CP-ABE, respectively. For the 15th attribute, the key generation of NU-SFO-CP-ABE is 15.79%, 15.15%, 17.04%, and 18.84% better than that of BOA-CP-ABE, WOA-CP-ABE, and GWO-CP-ABE, respectively. Similarly, for the 10th attribute, the key generation of NU-SFO-CP-ABE is 9.16%, 11.85%, 7.75%, and 12.5% superior to that of BOA-CP-ABE, WOA-CP-ABE, and GWO-CP-ABE, respectively. Therefore, the proposed NU-SFO-CP-ABE provides better results in the case of key generation analysis than the state-of-the-art algorithms.
In this study, an enhanced meta-heuristic-based RAO was developed on CP-ABE. The enhanced meta-heuristic concept was implemented in the encryption phase, which returned the optimized single share value after considering the entire attribute shares. The optimization concept minimized the encryption and communication costs by minimizing the CT size. The novel NU-SFO performed the RAO on CP-ABE by optimizing the random encryption exponent and the random vector. The performance evaluation demonstrated the robustness and reliability of the developed scheme compared to traditional algorithms. From the analysis, at the 20th attribute, the encryption time of NU-SFO-CP-ABE was 18.12%, 5.83%, 17.52%, and 9.6% superior to that of BOA-CP-ABE, WOA-CP-ABE, and GWO-CP-ABE, respectively. Similarly, at the 20th attribute, the decryption time of NU-SFO-CP-ABE was 15.38%, 16.67%, 12%, and 20.29% higher than that of BOA-CP-ABE, WOA-CP-ABE, and GWO-CP-ABE, respectively. Moreover, for the 20th attribute, the key generation of NU-SFO-CP-ABE was 16.03%, 17.29%, 15.38%, and 14.73% better than that of BOA-CP-ABE, WOA-CP-ABE, and GWO-CP-ABE, respectively. Hence, the analysis of the proposed NU-SFO-CP-ABE is better with better performance than all the existing algorithms.
Acknowledgement: We thank Deanship of Research, Prince Sattam Bin Abdul-Aziz University, KSA, for providing an opportunity to conduct research.
Funding Statement: The author received no specific funding for this study.
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.
1. F. Tao, Q. Qi, A. Liu and A. Kusiak, “Data-driven smart manufacturing,” Journal of Manufacturing Systems, vol. 48, no. 1, pp. 157–169, 2018. [Google Scholar]
2. M. Abdel-Basset, M. Mohamed and V. Chang, “NMCDA: A framework for evaluating cloud-computing services,” Future Generation Computer Systems, vol. 86, no. 2, pp. 12–29, 2018. [Google Scholar]
3. M. Kolhar, M. M. Abu-Alhaj and S. M. Abd El-atty, “Cloud data auditing techniques with a focus on privacy and security,” IEEE Security and Privacy, vol. 15, no. 1, pp. 42–51, 2017. [Google Scholar]
4. T. Khalid, M. A. Abbasi, M. Zuraiz and M. Aslam, “A survey on privacy and access control schemes in fog computing,” International Journal of Communication Systems, vol. 34, no. 2, pp. 41–81, 2021. [Google Scholar]
5. J. Li, Y. Zhang, J. Ning, X. Huang, G. S. Poh et al., “Attribute based encryption with privacy protection and accountability for CloudIoT,” IEEE Transactions on Cloud Computing, vol. 1, no. 1, pp. 1, 2020. [Google Scholar]
6. J. Li, X. Chen, S. S. Chow, Q. Huang, D. S. Wong et al., “Multi-authority fine-grained access control with accountability and its application in cloud,” Journal of Network and Computer Applications, vol. 112, no. 15, pp. 89–96, 2018. [Google Scholar]
7. R. R. Al-Dahhan, Q. Shi, G. M. Lee, M. G. and K. Kifayat, “Survey on revocation in ciphertext-policy attribute-based encryption,” Sensors, vol. 19, no. 7, pp. 3–22, 2019. [Google Scholar]
8. L. Li, T. Gu, L. Chang, Z. Xu, Y. Liu et al., “A Ciphertext-policy attribute-based encryption based on an ordered binary decision diagram,” IEEE Access, vol. 5, pp. 1137–1145, 2017. [Google Scholar]
9. X. Liang, Z. Cao, H. Lin and J. Shao, “Attribute based proxy reencryption with delegating capabilities,” in Proc. Int. Sym. on Information Computer, and Communications Security, Sidney, Australia, pp. 276–286, 2009. [Google Scholar]
10. S. Luo, J. Hu, Z. Chen, M. Soriano, S. Qing et al., “Ciphertext policy attribute-based proxy re-encryption,” in Lecturer Notes in Computer Science, 1st. ed., vol. 3494. Berlin, Germany: Springer, pp. 401–415, 2010. [Google Scholar]
11. X. Xu, J. Zhou, X. Wang and Y. Zhang, “Multi-authority proxy reencryption based on CP-ABE for cloud storage systems,” Journal of Systems Engineering and Electronics, vol. 27, no. 1, pp. 211–223, 2016. [Google Scholar]
12. X. Xie, H. Ma, J. Li and X. Chen, “An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing,” Journal of Universal Computer Science, vol. 19, no. 16, pp. 2349–2367, 2013. [Google Scholar]
13. V. Goyal, A. Jain, O. Pandey and A. Sahai, “Bounded ciphertext policy attribute based encryption,” Automata Languages and Programming, vol. 1, no. 1, pp. 579–591, 2008. [Google Scholar]
14. X. Liang, Z. Cao, H. Lin and D. Xing, “Provably secure and efficient bounded ciphertext policy attribute based encryption,” Information Computer, and Communications Security, vol. 2, no. 1, pp. 343–352, 2009. [Google Scholar]
15. K. Yang, X. Jia and K. Ren, “Secure and verifiable policy update outsourcing for big data access control in the cloud,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 12, pp. 3461–3470, 2015. [Google Scholar]
16. K. Yang, Q. Han, H. Li, K. Zheng, Z. Su et al., “An efficient and fine-grained big data access control scheme with privacy-preserving policy,” IEEE Internet of Things Journal, vol. 4, no. 2, pp. 563–571, 2017. [Google Scholar]
17. P. P. Kumar, P. S. Kumar and P. J. Alphonse, “An efficient ciphertext policy-attribute based encryption for big data access control in cloud computing,” in Proc. Ninth Int. Conf. on Advanced Computing (ICoACChennai, pp. 114–120, 2017. [Google Scholar]
18. C. Guo, R. Zhuang, Y. Jie, Y. Ren, T. Wu et al., “Fine-grained database field search using attribute-based encryption for e-healthcare clouds,” Journal of Medical Systems, vol. 40, no. 11, pp. 2–35, 2016. [Google Scholar]
19. P. K. Premkamal, S. K. Pasupuleti and J. P. Alphonse, “A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud,” Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 7, pp. 2693–2707, 2019. [Google Scholar]
20. J. Li, N. Chen and Y. Zhang, “Extended file hierarchy access control scheme with attribute based encryption in cloud computing,” IEEE Transactions on Emerging Topics in Computing, vol. 1, no. 1, pp. 1, 2019. [Google Scholar]
21. X. Qin, Y. Huang and X. Li, “An ECC-based access control scheme with lightweight decryption and conditional authentication for data sharing in vehicular networks,” Soft Computing, vol. 24, no. 24, pp. 18881, 2020. [Google Scholar]
22. R. Guo, H. Shi, Q. Zhao and D. Zheng, “Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems,” IEEE Access, vol. 6, no. 1, pp. 11676–11686, 2018. [Google Scholar]
23. J. Li, W. Yao, J. Han, Y. Zhang, J. Shen et al., “User collision avoidance CP-ABE with efficient attribute revocation for cloud storage,” IEEE Systems Journal, vol. 1, no. 2, pp. 1767–1777, 2020. [Google Scholar]
24. M. Rasori, P. Perazzo and G. Dini, “A lightweight and scalable attribute-based encryption system for smart cities,” Computer Communications, vol. 149, no. 1, pp. 78–89, 2020. [Google Scholar]
25. P. S. Challagidad and M. N. Birje, “Efficient multi-authority access control using attribute-based encryption in cloud storage,” Procedia Computer Science, vol. 167, no. 1, pp. 840–849, 2020. [Google Scholar]
26. M. Seyedali, M. Seyed and A. Lewis, “Grey Wolf optimizer,” Advances in Engineering Software, vol. 69, no. 1, pp. 46–61, 2014. [Google Scholar]
27. M. Seyedali and L. Andrew, “The whale optimization algorithm,” Advances in Engineering Software, vol. 95, no. 1, pp. 51–67, 2016. [Google Scholar]
28. A. Sankalap and S. Satvir, “Butterfly optimization algorithm: A novel approach for global optimization,” Soft Computing, vol. 1, no. 23, pp. 715–734, 2018. [Google Scholar]
29. G. F. Gomes, S. Sebastiao and C. Carlos, “A sunflower optimization (SFO) algorithm applied to damage identification on laminated composite plates,” Engineering with Computers, vol. 35, no. 1, pp. 619–626, 2019. [Google Scholar]
This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |