Skip to main content
Log in

Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The usage of data has grown exponentially well across prominent sectors in both public and private organizations. Security policies for the data are inevitable as data plays a major role even in prominent sectors like healthcare, defense. Accessing the data from the cloud is one of the easiest ways which is why most of the cloud service vendors pay more attention to secure the data on the cloud. Cyber criminals have been exploiting the cloud using various vulnerable methods and one among them is weak encryption methods. In order to solve these problems, some kind of new approach is needed and therefore cloud applications will be safer. The proposed secure sharing of data in the cloud using Multi-Authority Ciphertext Policy Attribute Based Encryption with Elliptic Curve Cryptography (MA-CPABE-ECC) is most appropriate for cloud since it has smaller key size, high security and less computation time. In the proposed work, the keys are generated based on the user attributes. Those keys are considered as points in elliptical curve and the encryption is performed so that greater security is achieved. Security analysis and performance analysis to the system was done and the results showed that we can achieve greater protection for cloud data transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Alguliyev RM, Sukhostat LV (2020) Efficient algorithm for big data clustering on single machine. CAAI Trans Intell Technol 5:9–14

    Article  Google Scholar 

  • Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology. Technicon

  • Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In Proc. IEEE Symposiums Security Privacy, pp 321–334

  • Chakraborty R, Verma G, Namasudra S (2020) IFODPSO-based multi-level image segmentation scheme aided with Masi entropy. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02506-w

    Article  Google Scholar 

  • Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inform Theory, pp 644–654

  • ElGamal, T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inform Theory, pp 469–472

  • Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006). ACM: Alexandria, pp 89–98

  • Guo F, Mu Y, Susilo W, Wong DS, Varadharajan V (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inform Forensics Security 9(5):763–771

    Article  Google Scholar 

  • Horvath M (2015) Attribute-based encryption optimized for cloud computing. Infocommun J 7:1–9

    MATH  Google Scholar 

  • Hur J (2013) Improving security and efficiency in attribute-based data sharing. IEEE Trans Knowledge Data Eng 25(10):2271–2282

    Article  Google Scholar 

  • Lewko A, Waters B (2011) Decentralizing attribute-based encryption. In Proc. Int. Conf. Theory Appl. Cryptography Technology Advanced Cryptology. EUROCRYPT, Tallinn, pp 568-588

  • Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inform Forensics Security 10:1981–1992

    Article  Google Scholar 

  • Liang K, Liu JK, Wong DS, Susilo W (2014) An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In Proceedings of European Symposium on Research in Computer Security, pp 257–272

  • Liang K, Susilo W, Liu JK (2015) Privacy-preserving ciphertext multisharing control for big data storage. IEEE Trans Inform Forensics Security 10:1578–1589

    Article  Google Scholar 

  • Ling C, Newport C (2007) Provably secure Ciphertext policy ABE. In Proceedings ACM Conference Computational Communication Security, pp 456–465

  • Liu Z, Seo H (2019) Cloud-NUMS: evaluating NUMS elliptic curve cryptography for Cloud platforms. IEEE Trans Inform Forensics Security

  • Namasudra S (2019) An improved attribute‐based encryption technique towards the data security in cloud computing. Concurrency and Computation: Practice and Exercise. https://doi.org/10.1002/cpe.4364

  • Namasudra S (2020) Data access control in the cloud computing environment for bioinformatics. Int J Appl Res Bioinform (IJARB). https://doi.org/10.4018/IJARB.2021010105

    Article  Google Scholar 

  • Namasudra S (2021) Fast and Secure Data Accessing by using DNA Computing for the Cloud Environment. IEEE Trans Services Comput, (in press)

  • Namasudra S, Deka GC (2021) Applications of blockchain in healthcare. Springer. https://doi.org/10.1007/978-981-15-9547-9

    Article  Google Scholar 

  • Namasudra S, Roy P (2017) Time saving protocol for data accessing in cloud computing. IET Commun 11:1558–1565

    Article  Google Scholar 

  • Namasudra S, Roy P, Vijayakumar P, Audithan S, Balamurugan B (2017) Time efficient secure DNA based access control model for cloud computing environment. Futur Gener Comput Syst 73:90–105

    Article  Google Scholar 

  • Namasudra S, Devi D, Choudhary S, Patan R, Kallam S (2018) Security, privacy, trust, and anonymity. In Advances of DNA Computing in Cryptography, Taylor & Francis, pp 138–150

  • Namasudra S, Chakraborty R, Majumder A, Moparthi NR (2020a) Securing multimedia by using DNA based encryption in the cloud computing environment. ACM Trans Multimedia Comput, Commun, Appl

  • Namasudra S, Deka GC, Johri P, Hosseinpour M, Gandomi AH (2020b) The revolution of blockchain: state-of-the-art and research challenges. Arch Comput Methods Eng

  • Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A (2020c) Towards DNA based data security in the cloud computing environment. Comput Commun 151:539–547

    Article  Google Scholar 

  • Namasudra S, Sharma S, Deka GC, Lorenz P (2020d) DNA computing and table based data accessing in the cloud environment. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2020.102835

    Article  Google Scholar 

  • Sahai A, Waters B (2005) Fuzzy identity-based encryption. In Proceedings International Conference Theory Application Cryptographic Technique, pp 457–473

  • Sandhia GK, Kasmir Raja SV, Jansi KR (2018) Multi-authority-based file hierarchy hidden CP-ABE scheme for cloud security. SOCA 12:295–303

    Article  Google Scholar 

  • Shrestha AP, Choi DY, Kwon GR, Han SJ (2010) Kerberos based authentication for inter-domain roaming in wireless heterogeneous network. Comput Sci Mathematics Appl 245–255

  • Tiplea FL, Dragan CC (2015) In Key-policy attribute-based encryption for Boolean circuits from bilinear maps. Springer International Publishing: Istanbul, 9024:175–193

  • Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016a) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inform Forensics Security 6–11

  • Wang S, Liang K, Liu JK, Chen J, Yu J, Xie W (2016b) Attribute based data sharing scheme revisited in cloud computing. IEEE Trans Inform Forensics Security 11:1661–1673

    Article  Google Scholar 

  • Yang Y, Zhu H, Lu H, Weng J, Zhang Y, Choo KKR (2016) Cloud based data sharing with ne-grained proxy re-encryption. Pervasive Mobile Comput 28:122–134

    Article  Google Scholar 

  • Zhao X, Li R, Zuo X (2019) Advances on QoS-aware web service selection and composition with nature-inspired computing. CAAI Trans Intell Technol 4:159–174

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. K. Sandhia.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sandhia, G.K., Raja, S.V.K. Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography. J Ambient Intell Human Comput 13, 3893–3902 (2022). https://doi.org/10.1007/s12652-021-03287-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-03287-6

Keywords

Navigation