Indonesian Journal of Electrical Engineering and Computer Science Vol. 28, No. 1, October 2022, pp. 545~550 ISSN: 2502-4752, DOI: 10.11591/ijeecs.v28.i1.pp545-550 545 Journal homepage: http://ijeecs.iaescore.com Key-cipher policy attribute-based encryption mechanism for access control of multimedia data in cloud storages Kavyasri Madakaripura Nagaraju, Ramesh Boraiah Department of Computer Science and Engineering, Malnad College of Engineering, Karnataka, India Article Info ABSTRACT Article history: Received Sep 29, 2021 Revised Jul 5, 2022 Accepted Aug 1, 2022 Cloud technology is advancing at a rapid pace. Many applications and multimedia data are hosted in the cloud, Security, confidentiality, and efficiency are the key drawbacks of cloud computing. There are a variety of access control systems on the market to secure the data and applications on the cloud. But key generation time is a major flaw both in multi-authority and single authority systems. Cipher policy attribute-based encryption (CP- ABE) is one of many cryptographic algorithms available for ensuring user confidentiality which provides fine-grained access control. It also addreses a number of issues related attribute revocation, key generation time, and issues in handling a large number of attributes. We present a mechanism called key-cipher-policy-based ABE (KCP) in this article, which is a hybrid approach and combines CP-ABE and KP ABE approaches which result in handling a wide range of attributes, an efficient key generation process, and addresses challenges in attribute revocation. Keywords: Access policy Attribute revocation Data owner Key-cipher-policy based ABE Secure access This is an open access article under the CC BY-SA license. Corresponding Author: Kavyasri Madakaripura Nagaraju Department of Computer Science and Engineering, Malnad College of Engineering Hassan, Karnataka, India Email: kavyasrimn88@gmail.com 1. INTRODUCTION Cloud computing as a technology makes a big shift from the traditional thinking to the usage of information technology (IT) resources. Cloud service providers supply a variety of services through the internet for a fee. This is a combination of parallel and distributed computing technologies where work is performed simultaneously on several units. The user will rent resources from the cloud services provider, who will not have to worry about maintenance and can focus on the task at hand. As technology progresses, multimedia is becoming increasingly important in the present environment. Multimedia is a powerful communication tool. Multimedia includes video, animation, music, and other mediums. Multimedia can be preserved on storage devices, but with the advent of cloud computing, more enterprises are turning to storage services. Storage-as-a-service is the most popular types of cloud computing. A cloud service provider delivers cloud-based services. Multimedia data stored on a data storage in the cloud. When storing and accessing multimedia data, the data storage server has privacy and security difficulties. We're focusing on work-related security concerns as well as issues with attribute revocation in conjunction with secure access control. We must protect the majority of data stored in cloud storage because it is highly sensitive. Secure attribute revocation is also required to protect the security of the user's data. A primary challenge is secure access to multimedia data housed in cloud data centers. When it comes to security, data encryption is the most effective way to safeguard sensitive data from unauthorised access. Earlier public key encryption often called as identity encryption, requires that encrypted data be encrypted by a single user. However, it lacks advanced data interchange capabilities. To overcome this