Data_Leakage_Detection_and_Prevention_Using_Ciphertext-Policy_Attribute_Based_Encryption_Algorithm
Data_Leakage_Detection_and_Prevention_Using_Ciphertext-Policy_Attribute_Based_Encryption_Algorithm
Keywords: Unauthorize, Leverages, Breaches, Data Leakage, Figure 1 shows the statistics of data breaches analytics.
Encryption. This article lists the phishing, malware, and cyberattacks that
I. INTRODUCTION: made the top ten most-read cyber security news stories of
2022, along with data breaches and leaks. Although data is
Data loss happens when information is physically or the driving force behind innovation and many technological
mentally removed from an organization, whether on purpose developments, the exponential growth in data volume has
or accidentally. Organizations are in charge of handling data resulted in a rise in vulnerabilities, especially with regard to
loss, which has grown to the biggest issue facing them data security and privacy. Phishing, malware, and
nowadays. A situation where information confidentiality is cyberattacks dominated the year's cybersecurity news,
jeopardized is called a data breach. This example of data underscoring the pressing need for robust defenses. One
being sent outside the organization to recipients who are not well-known cryptographic solution that allows safe data
authorised .Confidentially and Private data can be leaked, sharing and access control in cloud environments and across
while data loss occur as a result of deletion, system networks. This cryptographic solution, orchestrating access
malfunction, etc. The biggest concern that enterprises have through specified attributes, allowing only authorized users
these days is data loss or leaks. The major roots of data to decrypt and access data. Its fine-grained access control
leakages are insufficient access control, lack of encryption, offers a paradigm shift in safeguarding sensitive information,
inadequate monitoring, malicious insiders attack, integrate addressing the growing concerns of data integrity and
challenges and rapid technological challenges. In 2022 ,there privacy breaches. This research aims to establish a strong
were over4100 data breaches that were made public, which framework to prevent unauthorized access and minimize
translates to about 22 billion records being compromised. potential data leaks by utilizing CP-ABE's attribute-based
Security Magazine, a cyber security publication, stated that access control. This research endeavors to showcase the
numbers for 2022 are predicted to surpass this amount by as efficacy of CP-ABE algorithm in fortifying data security
much as 5%. protocols. Through meticulous analysis and empirical
investigation, the study aims to elucidate the inherent
strengths of CP-ABE in bolstering the resilience of data
2
zed licensed use limited to: Vignan's Foundation for Science Technology & Research (Deemed to be University). Downloaded on August 27,2024 at 13:37:17 UTC from IEEE Xplore. Restrictions
Encrypt (PK, M, A):The process of policy specification less than the node threshold value kx(dx = kx – 1).At the root
entails creating a boolean formula using attributes to define node R. a random values is chosen, becoming qR(0).For qxin
an access policy for encrypted data. Data is encrypted using other nodes, dx additional points are randomly selected , with
this access policy, resulting in a ciphertext that is linked to qx(0) set to qparent(x)(index(x)).The meticulous process
the designated policy. The message (ܯe)the access structure ensures the encryption of the ciphertext, enabling secure data
(As), which consists of attributes, and the public parameters transmission within the specified access structure.
(PK) are all used during encryption.This procedure
guarantees that the message can decrypted by a user who
satisfies the requirement of the access structure .The
Encryption process produces a ciphertext(CT) that includes
the encrpted message(Me)and the access structure (AS).
Decrypt(CT, SK): For improved understanding, a
Decrypt(PK,CT,SK):In order to access the encrypted recursive decryption algorithm is presented that outlines the
content, a user asks for a secret key. The key generating fundamental architecture of the decryption procedure. The
authority issues a key based on the attributes that the user inputs for this algorithm, called DecryptNode, are a node (x)
presents, provided that the user complies with the access that is taken from T, a private key (SK) that is linked to a set
rules. In realm of secure data decryption, harmony between of attributes (S), and a ciphertext (CT) that is made up of
user’s attribute align with the encryption parameter of public different parts , like (T, C ,̃ C, y אY : Cy, C′y). The
data, access policy , and a specific private key , a seamless construction is defined based on the presence of i in the
decoding process unfolds. This elegant integration ensures att(S) when x represents a leaf node, and its att’s i, is taken
that only authorized users with matching attributes can into consideration. This basic framework provides the
unlock the concealed content, exemplifying the epitome of foundation for more in-depth improvements and
secure communication. optimisations, which are covered in more detail in the
Identification and Mitigation of Data Leakage: To sections that follow.
identify unapproved access or data leaks: Monitoring of
Access Control: Make sure that only authorised users are
accessing the data by keeping a close eye on the access
records. To keep up with evolving security needs, evaluate
and update access policies on a regular basis. To identify any
irregularities or unauthorised access, keep thorough audit
logs that trace data access and modifications. Use encryption
to make sure that private information is safe even in the
event of illegal access. If an authorised user's characteristics
change or if their access is no longer required, put in place Evaluation: This present a concise overview
procedures to instantly withdraw their access. encompassing the security rationale behind our scheme,
directing readers to the complete proof in Appendix A,
Secure Transmission: To guard against interception and highlighting the efficiency of our system , and exploring
manipulation, make sure the data transmission is secure by potential strategies for addressing key revocation concerns .
utilising secure channels .This is a high-level summary of the In innovative system in ciphertext-Policy Attribute based
methods for detecting and preventing data leaks using Encryption revolutionizes encrypted access control. It
attribute-based encryption. To create a Solid and dependable empowers data encryption parities to define policies based
system , more complex cryptographic procedures and on user attribute, ensuring secure decryption by specified
security considerations must be made during actual users. Unlike traditional methods, our system accommodates
implementation. Seeking advice from cryptography any monotonic tree access structure, robust against colusion
specialists and comprehending use-case requirements is attacks. This implementation, enriched with optimizations,
strongly advised for real-world applications. showcases it efficiency.
B. Robust Security Framework:(CP-ABE): Key-revocation and numerical attributes: Revoke is
The adversary receives the public parameters, PK, from an essential component of CP-ABE algorithm system used to
the challenger after the Setup algorithm is executed. manage access to encrypted data, particularly in cases where
revocation or modification of users access rights is required.
Key generation: The key generation algorithm utilizes The application of numerical attributes in CP-ABE for data
set of attributes to create a unique key. For each attribute , leakage prevention can be somewhat more complicated, but
the algorithm selects random values within a specified range. it is still quite successful. Revocation is essential to make
These values, denoted as r and rj for each attribute j, are sure that a user can no longer access the encrypted data in the
incorporated to compute the final key. This process ensures event that their attributes change or their access needs to be
the generation of distinct keys tailored to the given attributes, revoked. Update user keys on a regular basis, making sure to
enhancing the security and uniqueness of encryption system. check against the revocation list to make sure any revoked
attributes are taken into consideration. Access policies can
make use of numerical conditions by encoding the numerical
values into attributes when integrating numerical attributes in
CP-ABE. These numerical attributes will be included in the
policy during encryption. In order to access the data and
Encrypt (PK, M, T ) :The encryption algorithm encrypts perform decryption, the policy condition, including the
message M using the tree access structure T. Using a top- numerical attributes, must be satisfied. To avoid interception
down approach, generating polynomials have degree dx, one and tampering, make sure the encrypted data and keys are
3
zed licensed use limited to: Vignan's Foundation for Science Technology & Research (Deemed to be University). Downloaded on August 27,2024 at 13:37:17 UTC from IEEE Xplore. Restrictions
transferred and kept securely. The system is made more
flexible and optimised to stop data leaks by adding numerical
attributes to CP-ABE and handling key revocation well.
C. Implementation of Proposed Methodology:
Implementation is with data classification, encryption,
user attribute management, logging and monitoring, key
generation, access control, integration on existing system.
Keeping an eye on access logs at all times to spot any
unauthorised access attempts. Examine and record each IV. RESULTS:
attempt at access, and look into any irregularities. Real-Time Results that we got for Data Leakage Detection and
Revocation. Put in place a system that allows access to be Prevention using cloud computing with CP-ABE Algorithm.
revoked instantly when a user becomes ineligible or their
attributes change. To track data access and modifications and
help detect possible leaks and unauthorised access, keep 140
thorough audit logs. Owners and user both has 120
Authentication Process, user request for the file which has 100
time(ms)
the data to owner that is uploaded and decrypted with the set 80
of attributes if attributes are matched then we can decrypt the 60
file ,if not can’t decrypt the file. 40
20
0
0 10 20 30 40 50
number of attributes
4
zed licensed use limited to: Vignan's Foundation for Science Technology & Research (Deemed to be University). Downloaded on August 27,2024 at 13:37:17 UTC from IEEE Xplore. Restrictions
possible data breaches is presented by the integration of CP-
70 ABE with anomaly detection techniques. To maintain data
60 security and privacy in the ever-changing digital world,
50 research and development must be given top priority in order
Axis Title
5
zed licensed use limited to: Vignan's Foundation for Science Technology & Research (Deemed to be University). Downloaded on August 27,2024 at 13:37:17 UTC from IEEE Xplore. Restrictions