Cloud computing has prompted interest in data outsourcing. Attribute-based encryption (ABE) enhances file access control in cloud storage. User revocation remains a key challenge. This article presents a ciphertext-policy ABE (CP-ABE) scheme for efficient user revocation in cloud storage. User groups manage revocation, reducing computation costs. The scheme resists collusion attacks and is secure under the Diffie-Hellman assumption. Experiments confirm low computation costs, making it suitable for resource-constrained devices.

  • Attribute-based Encryption
  • Cloud Computing
  • Data Security
View More

Cloud computing offers new ways to access and store personal and business data via the internet but faces trust issues due to third-party involvement. Fog computing is a solution for data security. Despite cloud storage’s widespread use, security remains a major concern. Evolving communication and computing paradigms introduce new data security challenges. Existing cloud data protection methods fail to prevent data theft attacks. Fog computing utilizes User Behavior Profiling and Decoy Technology. The proposed CUSUM algorithm improves data theft detection by tracking user access pattern changes. User Behavior Profiling includes identifying users based on typing delays and using a simplified picture password.

Module Description
Trusted Authority


The authority verifies user details. An algorithm with basic CP-ABE generates a public parameter and master key. It creates ciphertext for specific users based on access policies.

Apache Server

Apache server send the file to the requested user  save user details ,Here re encrypt the file name

Group Manager

Upload the video file and encrypt send the file to the APACHE  server.

Data User

User sends the request for file and secret key and can  download the file by using encryption

  • Cloud Computing
  • Data Security
  • Fog Computing
View More