Abstract
The usage of data has grown exponentially well across prominent sectors in both public and private organizations. Security policies for the data are inevitable as data plays a major role even in prominent sectors like healthcare, defense. Accessing the data from the cloud is one of the easiest ways which is why most of the cloud service vendors pay more attention to secure the data on the cloud. Cyber criminals have been exploiting the cloud using various vulnerable methods and one among them is weak encryption methods. In order to solve these problems, some kind of new approach is needed and therefore cloud applications will be safer. The proposed secure sharing of data in the cloud using Multi-Authority Ciphertext Policy Attribute Based Encryption with Elliptic Curve Cryptography (MA-CPABE-ECC) is most appropriate for cloud since it has smaller key size, high security and less computation time. In the proposed work, the keys are generated based on the user attributes. Those keys are considered as points in elliptical curve and the encryption is performed so that greater security is achieved. Security analysis and performance analysis to the system was done and the results showed that we can achieve greater protection for cloud data transmission.





Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Alguliyev RM, Sukhostat LV (2020) Efficient algorithm for big data clustering on single machine. CAAI Trans Intell Technol 5:9–14
Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology. Technicon
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In Proc. IEEE Symposiums Security Privacy, pp 321–334
Chakraborty R, Verma G, Namasudra S (2020) IFODPSO-based multi-level image segmentation scheme aided with Masi entropy. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02506-w
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inform Theory, pp 644–654
ElGamal, T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inform Theory, pp 469–472
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006). ACM: Alexandria, pp 89–98
Guo F, Mu Y, Susilo W, Wong DS, Varadharajan V (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inform Forensics Security 9(5):763–771
Horvath M (2015) Attribute-based encryption optimized for cloud computing. Infocommun J 7:1–9
Hur J (2013) Improving security and efficiency in attribute-based data sharing. IEEE Trans Knowledge Data Eng 25(10):2271–2282
Lewko A, Waters B (2011) Decentralizing attribute-based encryption. In Proc. Int. Conf. Theory Appl. Cryptography Technology Advanced Cryptology. EUROCRYPT, Tallinn, pp 568-588
Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inform Forensics Security 10:1981–1992
Liang K, Liu JK, Wong DS, Susilo W (2014) An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In Proceedings of European Symposium on Research in Computer Security, pp 257–272
Liang K, Susilo W, Liu JK (2015) Privacy-preserving ciphertext multisharing control for big data storage. IEEE Trans Inform Forensics Security 10:1578–1589
Ling C, Newport C (2007) Provably secure Ciphertext policy ABE. In Proceedings ACM Conference Computational Communication Security, pp 456–465
Liu Z, Seo H (2019) Cloud-NUMS: evaluating NUMS elliptic curve cryptography for Cloud platforms. IEEE Trans Inform Forensics Security
Namasudra S (2019) An improved attribute‐based encryption technique towards the data security in cloud computing. Concurrency and Computation: Practice and Exercise. https://doi.org/10.1002/cpe.4364
Namasudra S (2020) Data access control in the cloud computing environment for bioinformatics. Int J Appl Res Bioinform (IJARB). https://doi.org/10.4018/IJARB.2021010105
Namasudra S (2021) Fast and Secure Data Accessing by using DNA Computing for the Cloud Environment. IEEE Trans Services Comput, (in press)
Namasudra S, Deka GC (2021) Applications of blockchain in healthcare. Springer. https://doi.org/10.1007/978-981-15-9547-9
Namasudra S, Roy P (2017) Time saving protocol for data accessing in cloud computing. IET Commun 11:1558–1565
Namasudra S, Roy P, Vijayakumar P, Audithan S, Balamurugan B (2017) Time efficient secure DNA based access control model for cloud computing environment. Futur Gener Comput Syst 73:90–105
Namasudra S, Devi D, Choudhary S, Patan R, Kallam S (2018) Security, privacy, trust, and anonymity. In Advances of DNA Computing in Cryptography, Taylor & Francis, pp 138–150
Namasudra S, Chakraborty R, Majumder A, Moparthi NR (2020a) Securing multimedia by using DNA based encryption in the cloud computing environment. ACM Trans Multimedia Comput, Commun, Appl
Namasudra S, Deka GC, Johri P, Hosseinpour M, Gandomi AH (2020b) The revolution of blockchain: state-of-the-art and research challenges. Arch Comput Methods Eng
Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A (2020c) Towards DNA based data security in the cloud computing environment. Comput Commun 151:539–547
Namasudra S, Sharma S, Deka GC, Lorenz P (2020d) DNA computing and table based data accessing in the cloud environment. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2020.102835
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In Proceedings International Conference Theory Application Cryptographic Technique, pp 457–473
Sandhia GK, Kasmir Raja SV, Jansi KR (2018) Multi-authority-based file hierarchy hidden CP-ABE scheme for cloud security. SOCA 12:295–303
Shrestha AP, Choi DY, Kwon GR, Han SJ (2010) Kerberos based authentication for inter-domain roaming in wireless heterogeneous network. Comput Sci Mathematics Appl 245–255
Tiplea FL, Dragan CC (2015) In Key-policy attribute-based encryption for Boolean circuits from bilinear maps. Springer International Publishing: Istanbul, 9024:175–193
Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016a) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inform Forensics Security 6–11
Wang S, Liang K, Liu JK, Chen J, Yu J, Xie W (2016b) Attribute based data sharing scheme revisited in cloud computing. IEEE Trans Inform Forensics Security 11:1661–1673
Yang Y, Zhu H, Lu H, Weng J, Zhang Y, Choo KKR (2016) Cloud based data sharing with ne-grained proxy re-encryption. Pervasive Mobile Comput 28:122–134
Zhao X, Li R, Zuo X (2019) Advances on QoS-aware web service selection and composition with nature-inspired computing. CAAI Trans Intell Technol 4:159–174
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sandhia, G.K., Raja, S.V.K. Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography. J Ambient Intell Human Comput 13, 3893–3902 (2022). https://doi.org/10.1007/s12652-021-03287-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-021-03287-6