Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{175841,
author = {Sakthidevi I and Dhivyan R and Gokul S and Inbanathan P and Jedharsan J},
title = {HIERARCHICAL ATTRIBUTE BASED ENCRYPTION WITH EDGE COMPUTING},
journal = {International Journal of Innovative Research in Technology},
year = {2025},
volume = {11},
number = {11},
pages = {4530-4535},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=175841},
abstract = {This project proposes Hierarchical Attribute-Based Encryption (HABE) with Edge Computing improves data security and access control in distributed software systems by combining attribute-based encryption (ABE) with edge processing, where edge nodes perform encryption, decryption, and access control tasks near data sources to reduce dependence on centralized cloud servers. This system employs RBAC encryption, ensuring that only authorized users with specific attributes can decrypt data, thereby strengthening confidentiality. By conducting security operations at the edge, it achieves lower latency, faster data access, and optimized bandwidth usage. Additionally, edge nodes enforce access policies, process local decryption requests, and authenticate users while upholding robust security measures. Moreover, HABE with Edge Computing enhances scalability and flexibility in access control by dynamically adjusting encryption policies based on real-time contextual information. Edge nodes can update attribute-based policies efficiently, ensuring that access rights remain consistent with evolving security requirements. This decentralized approach mitigates the risks associated with a single point of failure in cloud-based encryption systems, offering resilience against cyber threats and network failures. Additionally, integrating HABE with edge computing facilitates secure data sharing among distributed users by enabling fine-grained access control, reducing unauthorized data exposure, and ensuring compliance with stringent security regulations. By leveraging computational power at the edge, the system also minimizes encryption and decryption overhead, improving system performance while maintaining strong data protection mechanisms.},
keywords = {Edge Computing, Access control, Data Security, Encryption & Decryption, Low Latency, Master secret key, Fine-Grained Access.},
month = {April},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry