The Use of Attribute-Based Encryption for Secure Data Access
Penggunaan Enkripsi Berbasis Atribut untuk Akses Data yang Aman
DOI:
https://doi.org/10.21070/pels.v8i2.2963Keywords:
Attribute Based Encryption, Blockchain Security, Data Sharing, Cloud Computing, Access ControlAbstract
General Background: Secure data sharing in cloud computing and Internet of Things environments requires advanced cryptographic mechanisms to ensure privacy and controlled access. Specific Background: Attribute-based encryption provides fine-grained access control, while blockchain technology introduces decentralized trust and data integrity. Knowledge Gap: Existing approaches often lack an integrated framework that combines encryption flexibility with decentralized security for scalable data sharing systems. Aims: This study aims to develop a secure data sharing framework by integrating attribute-based encryption with blockchain technology. Results: The findings indicate that the proposed approach enables fine-grained access control, strengthens data confidentiality, and supports secure and verifiable transactions in distributed environments. The framework also demonstrates improved reliability in managing encrypted data across multiple systems. Novelty: This study presents a combined architecture that integrates attribute-based encryption with blockchain to address limitations in traditional centralized security models. Implications: The results suggest that the proposed framework can support secure data sharing in cloud and IoT applications, offering a scalable solution for modern distributed systems.
Keywords: Attribute Based Encryption, Blockchain Security, Data Sharing, Cloud Computing, Access Control
Key Findings Highlights
- Fine grained policies regulate encrypted information access
- Distributed ledger supports transparent verification processes
- Integrated model enables secure multi environment communication
Downloads
References
T. Ganesan, “Dynamic Secure Data Management with Attribute-Based Encryption for Mobile Financial Clouds,” International Journal of Applied Science Engineering and Management, vol. 17, no. 2, 2023.
M. Rasori, M. La Manna, P. Perazzo, and G. Dini, “A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of Things,” IEEE Internet of Things Journal, vol. 9, no. 11, pp. 8269–8290, 2022.
Z. B. Jemihin, S. F. Tan, and G. C. Chung, “Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective A Survey,” Cryptography, vol. 6, no. 3, p. 40, 2022.
T. Khoachev, “A Brief Review on Attribute-Based Encryption Approaches,” SSRN Electronic Journal, 2023.
R. Walid, K. P. Joshi, and S. G. Choi, “Comparison of Attribute-Based Encryption Schemes in Securing Healthcare Systems,” Scientific Reports, vol. 14, p. 7147, 2024.
Y. Jiang, X. Xu, and F. Xiao, “Attribute-Based Encryption with Blockchain Protection Scheme for Electronic Health Records,” IEEE Transactions on Network and Service Management, vol. 19, no. 4, pp. 3884–3895, 2022.
X. Xiang and X. Zhao, “Blockchain-Assisted Searchable Attribute-Based Encryption for E-Health Systems,” Journal of Systems Architecture, vol. 124, p. 102417, 2022.
X. Yang and C. Zhang, “Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme,” Applied Sciences, vol. 12, no. 21, p. 10812, 2022.
Z. Yang et al., “An Attribute-Based Access Control Scheme Using Blockchain Technology for IoT Data Protection,” High-Confidence Computing, vol. 4, no. 3, p. 100199, 2024.
S. Hohenberger, G. Lu, B. Waters, and D. J. Wu, “Registered Attribute-Based Encryption,” in Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, pp. 511–542.
T. Wang, Y. Zhou, H. Ma, and R. Zhang, “Enhanced Dual-Policy Attribute-Based Encryption for Secure Data Sharing in the Cloud,” Security and Communication Networks, vol. 2022, Art. no. 1867584, 2022.
F. Luo, H. Wang, X. Yan, and J. Wu, “Key-Policy Attribute-Based Encryption with Switchable Attributes for Fine-Grained Access Control of Encrypted Data,” IEEE Transactions on Information Forensics and Security, vol. 19, pp. 7245–7258, 2024.
A. Sasikumar et al., “Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things,” IEEE Access, vol. 12, pp. 12586–12601, 2024.
S. Chen, J. Li, Y. Zhang, and J. Han, “Efficient Revocable Attribute-Based Encryption with Verifiable Data Integrity,” IEEE Internet of Things Journal, vol. 11, no. 6, pp. 10441–10451, 2023.
G. Yang et al., “An Efficient Attribute-Based Encryption Scheme with Data Security Classification in the Multi-Cloud Environment,” Electronics, vol. 12, no. 20, p. 4237, 2023.
L. Pioro, J. Sychowiec, K. Kanciak, and Z. Zielinski, “Application of Attribute-Based Encryption in Military Internet of Things Environment,” Sensors, vol. 24, no. 18, p. 5863, 2024.
Y. Dai et al., “Blockchain Empowered Access Control for Digital Twin System with Attribute-Based Encryption,” Future Generation Computer Systems, vol. 160, pp. 564–576, 2024.
M. Almasian and A. Shafieinejad, “Secure Cloud File Sharing Scheme Using Blockchain and Attribute-Based Encryption,” Computer Standards and Interfaces, vol. 87, p. 103745, 2024.
C. K. Ejeofobiri et al., “Securing Cloud Databases Using AI and Attribute-Based Encryption,” International Journal for Multidisciplinary Research, pp. 39–47, 2025.
S. Rani and G. Srivastava, “Secure Hierarchical Fog Computing-Based Architecture for Industry 5.0 Using an Attribute-Based Encryption Scheme,” Expert Systems with Applications, vol. 235, p. 121180, 2024.
W. Huang et al., “ZT-Access Combining Zero Trust Access Control with Attribute-Based Encryption Against Compromised Devices in Power IoT Environments,” Ad Hoc Networks, vol. 145, p. 103161, 2023.
M. Venema, G. Alpar, and J. H. Hoepman, “Systematizing Core Properties of Pairing-Based Attribute-Based Encryption to Uncover Remaining Challenges in Enforcing Access Control in Practice,” Designs Codes and Cryptography, vol. 91, no. 1, pp. 165–220, 2023.
V. E. Arasi, K. I. Gandhi, and K. Kulothungan, “Auditable Attribute-Based Data Access Control Using Blockchain in Cloud Storage,” The Journal of Supercomputing, vol. 78, no. 8, pp. 10772–10798, 2022.
K. Routray and P. Bera, “Privacy Preserving Spatio-Temporal Attribute-Based Encryption for Cloud Applications,” Cluster Computing, vol. 28, no. 1, p. 34, 2025.
H. Wu, Y. Liu, K. Zhu, and L. Zhang, “Data Sharing System with Attribute-Based Encryption in Blockchain and Privacy Computing,” Symmetry, vol. 16, no. 11, p. 1550, 2024.
X. Yang, A. Chen, Z. Wang, and S. Li, “Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption,” Security and Communication Networks, vol. 2022, Art. no. 2204832, 2022.
K. K. Singamaneni, G. Muhammad, and Z. Ali, “A Novel Quantum Hash-Based Attribute-Based Encryption Approach for Secure Data Integrity and Access Control in Mobile Edge Computing Enabled Customer Behavior Analysis,” IEEE Access, vol. 12, pp. 37378–37397, 2024.
A. Saidi, O. Nouali, and A. Amira, “SHARE-ABE An Efficient and Secure Data Sharing Framework Based on Ciphertext-Policy Attribute-Based Encryption and Fog Computing,” Cluster Computing, vol. 25, no. 1, pp. 167–185, 2022.
X. Wang et al., “Attribute-Based Access Control Encryption,” IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 3, pp. 2227–2242, 2024.
J. Y. Deshmukh, S. K. Yadav, and G. M. Bhandari, “Attribute-Based Encryption Mechanism with Privacy Preserving Approach in Cloud Computing,” Materials Today Proceedings, vol. 80, pp. 1786–1791, 2023.
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2026 Malath Sabri Kareem

This work is licensed under a Creative Commons Attribution 4.0 International License.
