Abstract
Cloud technology is emerging as a widely accepted technology in the recent years due to its robust nature. Cloud computation is basically developed on the fact that the resources can be shared between numerous devices to achieve efficient network operation among devices with minimized computation expenses. However, the sharing nature poses a security risk for the devices whose resources are being shared. Almost in all the existing works on cloud security, a single trusted third party (TTP) is used for key issue and authorization. However, using a single TTP may results in single-point failure and security risks. Most of the previous works on cloud security focus on storage security rather than considering the computation security. In order to solve these issues, in this paper, multi-authority-based file hierarchy hidden CP-ABE scheme for cloud security is proposed. In this scheme, the files are arranged in hierarchical order based on their attribute weights. Then when a cloud user needs certain resources, it requests the cloud service provider (CSP). The CSP links with the cloud owner to provide the requested file after encrypting it. The cloud server encrypts and places the encrypted file in CSP, which is later retrieved by cloud user. In this way, all the files that are being used are encrypted along with strict authentication to ensure cloud security.
Similar content being viewed by others
References
Saravana Kumar N, Rajya Lakshmi GV, Balamurugan B (2015) Enhanced attribute based encryption for cloud computing. Procedia Comput Sci 46:689–696
Wang S, Liang K, Liu JK, Chen J, Jianping Yu, Xie W (2016) Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans Inf Forensics Secur 11(8):1661–1673
Wang C, Luo J (2013) An efficient key-policy attribute-based encryption scheme with constant ciphertext length. Math Probl Eng 2013:810969-1–810969-7. https://doi.org/10.1155/2013/810969
Wang S, Zhou J, Liu JK, Jianping Yu, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277
Phuong TVX, Yang G, Susilo W (2016) Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans Inf Forensics Secur 11(1):35–45
Minu George C, Gnanadhas S, Saranya K (2013) A survey on attribute based encryption scheme in cloud computing. Int J Adv Res Comput Commun Eng 2(11):4408–4412
Luo E, Liu Q, Wang G (2016) Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun Lett 20(9):1772–1775
Wei L, Zhu H, Cao Z, Dong X, Jia W, Chen Y, Vasilakos AV (2013) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371–386
Naik AR, Damahe LB (2016) Enhancing data security and access control in cloud environment using modified attribute based encryption mechanism. Int J Comput Netw Inf Secur 10:53–60
Fan C-I, Tseng Y-F, Lin C-W (2016) Attribute-based encryption from identity-based encryption. J Latex Class Files 2016:6
Challagidad PS, Reshmi VS, Birje MN (2017) Reputation based trust model in cloud computing. Internet Things Cloud Comput 5(5–1):5–12
Gaetani E, Aniello L, Baldoni R, Lombardi F, Margheri A, Sassone V (2017) Block chain-based database to ensure data integrity in cloud computing environments. In: Proceedings of the first Italian conference on cybersecurity (ITASEC17), Venice, Italy
Zheng H, Wu J, Wang B, Chen J (2017) Modified ciphertext-policy attribute-based encryption scheme with efficient revocation for PHR system. Math Probl Eng 2017:6808190-1–6808190-10
A. De Caro and V. Iovino, “jPBC: Java pairing based cryptography,” in Proc. IEEE Symp. Comput. Commun., Jun./Jul. 2011, pp. 850–855
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: Proceedings of IEEE symposium on security and privacy, pp 321–334
Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sandhia, G.K., Kasmir Raja, S.V. & Jansi, K.R. Multi-Authority-Based File Hierarchy Hidden CP-ABE Scheme for Cloud Security. SOCA 12, 295–303 (2018). https://doi.org/10.1007/s11761-018-0240-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11761-018-0240-6