Skip to main content

Advertisement

Log in

Multi-Authority-Based File Hierarchy Hidden CP-ABE Scheme for Cloud Security

  • Special Issue Paper
  • Published:
Service Oriented Computing and Applications Aims and scope Submit manuscript

Abstract

Cloud technology is emerging as a widely accepted technology in the recent years due to its robust nature. Cloud computation is basically developed on the fact that the resources can be shared between numerous devices to achieve efficient network operation among devices with minimized computation expenses. However, the sharing nature poses a security risk for the devices whose resources are being shared. Almost in all the existing works on cloud security, a single trusted third party (TTP) is used for key issue and authorization. However, using a single TTP may results in single-point failure and security risks. Most of the previous works on cloud security focus on storage security rather than considering the computation security. In order to solve these issues, in this paper, multi-authority-based file hierarchy hidden CP-ABE scheme for cloud security is proposed. In this scheme, the files are arranged in hierarchical order based on their attribute weights. Then when a cloud user needs certain resources, it requests the cloud service provider (CSP). The CSP links with the cloud owner to provide the requested file after encrypting it. The cloud server encrypts and places the encrypted file in CSP, which is later retrieved by cloud user. In this way, all the files that are being used are encrypted along with strict authentication to ensure cloud security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Saravana Kumar N, Rajya Lakshmi GV, Balamurugan B (2015) Enhanced attribute based encryption for cloud computing. Procedia Comput Sci 46:689–696

    Article  Google Scholar 

  2. Wang S, Liang K, Liu JK, Chen J, Jianping Yu, Xie W (2016) Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans Inf Forensics Secur 11(8):1661–1673

    Article  Google Scholar 

  3. Wang C, Luo J (2013) An efficient key-policy attribute-based encryption scheme with constant ciphertext length. Math Probl Eng 2013:810969-1–810969-7. https://doi.org/10.1155/2013/810969

    Article  MATH  Google Scholar 

  4. Wang S, Zhou J, Liu JK, Jianping Yu, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277

    Article  Google Scholar 

  5. Phuong TVX, Yang G, Susilo W (2016) Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans Inf Forensics Secur 11(1):35–45

    Article  Google Scholar 

  6. Minu George C, Gnanadhas S, Saranya K (2013) A survey on attribute based encryption scheme in cloud computing. Int J Adv Res Comput Commun Eng 2(11):4408–4412

    Google Scholar 

  7. Luo E, Liu Q, Wang G (2016) Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun Lett 20(9):1772–1775

    Article  Google Scholar 

  8. Wei L, Zhu H, Cao Z, Dong X, Jia W, Chen Y, Vasilakos AV (2013) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371–386

    Article  Google Scholar 

  9. Naik AR, Damahe LB (2016) Enhancing data security and access control in cloud environment using modified attribute based encryption mechanism. Int J Comput Netw Inf Secur 10:53–60

    Google Scholar 

  10. Fan C-I, Tseng Y-F, Lin C-W (2016) Attribute-based encryption from identity-based encryption. J Latex Class Files 2016:6

    Google Scholar 

  11. Challagidad PS, Reshmi VS, Birje MN (2017) Reputation based trust model in cloud computing. Internet Things Cloud Comput 5(5–1):5–12

    Google Scholar 

  12. Gaetani E, Aniello L, Baldoni R, Lombardi F, Margheri A, Sassone V (2017) Block chain-based database to ensure data integrity in cloud computing environments. In: Proceedings of the first Italian conference on cybersecurity (ITASEC17), Venice, Italy

  13. Zheng H, Wu J, Wang B, Chen J (2017) Modified ciphertext-policy attribute-based encryption scheme with efficient revocation for PHR system. Math Probl Eng 2017:6808190-1–6808190-10

    Google Scholar 

  14. A. De Caro and V. Iovino, “jPBC: Java pairing based cryptography,” in Proc. IEEE Symp. Comput. Commun., Jun./Jul. 2011, pp. 850–855

  15. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: Proceedings of IEEE symposium on security and privacy, pp 321–334

  16. Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. K. Sandhia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sandhia, G.K., Kasmir Raja, S.V. & Jansi, K.R. Multi-Authority-Based File Hierarchy Hidden CP-ABE Scheme for Cloud Security. SOCA 12, 295–303 (2018). https://doi.org/10.1007/s11761-018-0240-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11761-018-0240-6

Keywords

Navigation