ACCOUNTABLE DATA AUTHORIZATION IN CLOUD ENVIRONMENTS: AN IDENTITY-BASED ENCRYPTION FRAMEWORK WITH EQUALITY TESTING
Abstract
Ensuring secure and accountable access control in cloud environments is critical to protecting sensitive data from unauthorized use. This paper presents an identity-based encryption (IBE) framework enhanced with equality testing capabilities to support accountable data authorization. The proposed model allows data owners to encrypt information based on user identities while enabling controlled equality checks on ciphertexts without compromising data confidentiality. Additionally, a built-in accountability mechanism enables traceability of malicious activities and misuse of access privileges. Security and performance evaluations demonstrate that the framework provides strong data protection, efficient query operations, and practical enforcement of data accountability in distributed cloud systems.
Keywords
References
Similar Articles
- Prof. Lucas F. Oliveira, SM9-ENHANCED KEY-POLICY ATTRIBUTE-BASED ENCRYPTION: DESIGN, ANALYSIS, AND APPLICATIONS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 06 (2025): Volume 02 Issue 06
- Dr. Elena R. Moretti, Intent-Aware Decentralized Identity and Zero-Trust Framework for Agentic AI Workloads , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Svetlana Petrova, Beyond Hyperscale: The Socio-Technical Adaptation of Site Reliability Engineering for Enhanced Resilience in Critical Infrastructure , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Dr. Alexei Morozov, Prof. Kevin J. Donovan, The Transformative Impact of Containerization on Modern Web Development: An In-depth Analysis of Docker and Kubernetes Ecosystems , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Prof. Isabella Rossi, Dr. Luis Fernando Páez, GEOSPATIAL ANOMALY DETECTION FOR ENHANCED SECURITY IN DELAY-TOLERANT NETWORKS , International Journal of Modern Computer Science and IT Innovations: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Sofia Duarte, Jiwon Park, SECURING LARGE-SCALE IOT NETWORKS: A FEDERATED TRANSFER LEARNING APPROACH FOR REAL-TIME INTRUSION DETECTION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 06 (2025): Volume 02 Issue 06
- Felicia S. Lee, A COMPARATIVE ANALYSIS OF SERVICE MESH PROXY ARCHITECTURES: FROM SIDECARS TO AMBIENT AND PROXYLESS MODELS IN CLOUD-NATIVE ENVIRONMENTS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Dr. Julian C. Vance, Prof. Anya Sharma, Synergistic Integration of AI and Blockchain: A Framework for Decentralized and Trustworthy Systems , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 08 (2025): Volume 02 Issue 08
- Tang Shu Qi, Autonomous Resilience: Integrating Generative AI-Driven Threat Detection with Adaptive Query Optimization in Distributed Ecosystems , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Sneha R. Patil, Dr. Liam O. Hughes, ENHANCED MALWARE DETECTION THROUGH FUNCTION PARAMETER ENCODING AND API DEPENDENCY MODELING , International Journal of Modern Computer Science and IT Innovations: Vol. 1 No. 01 (2024): Volume 01 Issue 01
You may also start an advanced similarity search for this article.