ACCOUNTABLE DATA AUTHORIZATION IN CLOUD ENVIRONMENTS: AN IDENTITY-BASED ENCRYPTION FRAMEWORK WITH EQUALITY TESTING
Abstract
Ensuring secure and accountable access control in cloud environments is critical to protecting sensitive data from unauthorized use. This paper presents an identity-based encryption (IBE) framework enhanced with equality testing capabilities to support accountable data authorization. The proposed model allows data owners to encrypt information based on user identities while enabling controlled equality checks on ciphertexts without compromising data confidentiality. Additionally, a built-in accountability mechanism enables traceability of malicious activities and misuse of access privileges. Security and performance evaluations demonstrate that the framework provides strong data protection, efficient query operations, and practical enforcement of data accountability in distributed cloud systems.
Keywords
References
Similar Articles
- Prof. Lucas F. Oliveira, SM9-ENHANCED KEY-POLICY ATTRIBUTE-BASED ENCRYPTION: DESIGN, ANALYSIS, AND APPLICATIONS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 06 (2025): Volume 02 Issue 06
- Hiroshi Tanaka, Architectural Synergies: Integrating Blockchain, Fog Computing, And Generative Intelligence for Secure Digital Twin Ecosystems in Cyber-Physical Systems , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 02 (2026): Volume 03 Issue 02
- Dr. Eleanor Whitfield, Architecting Secure and Cost-Optimized Iot-Cloud Ecosystems: Integrating AI-Driven Intrusion Detection, Multi-Path Routing, And Intelligent Workload Scheduling in Distributed Systems , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Prof. Dr. Matthias Reinhardt, Cloud-Orchestrated Ensemble Deep Learning Architectures for Predictive Modeling of Cryptocurrency Market Dynamics: A Theoretical, Empirical, and Cyber-Physical Systems Perspective , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Dr. Adrian K. Varela, Edge Intelligence-Driven Intrusion Detection for Internet of Things Networks in Next-Generation Communication Systems , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 03 (2026): Volume03 Issue03
- Dr. Elena R. Moretti, Intent-Aware Decentralized Identity and Zero-Trust Framework for Agentic AI Workloads , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Dr. Rohan Verma, Dr. Sneha Kulkarni, Machine-Learning Architectures enabling Human Trait Verification Alternatives within Risk-Coverage Ecosystems: Resilient Identity Validation, Policy Adherence , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 02 (2026): Volume 03 Issue 02
- Svetlana Petrova, Beyond Hyperscale: The Socio-Technical Adaptation of Site Reliability Engineering for Enhanced Resilience in Critical Infrastructure , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Prof. Elise Vandermark, INTEGRATING LAKEHOUSE ARCHITECTURES AND CLOUD DATA WAREHOUSING FOR NEXT-GENERATION ENTERPRISE ANALYTICS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 12 (2025): Volume 02 Issue 12
- Dr. Leila Mansouri, Cloud Computing AsInfrastructural ESG Capital: Strategic Implications For Corporate Sustainability , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 11 (2025): Volume 02 Issue 11
You may also start an advanced similarity search for this article.