CFP last date
20 January 2025
Reseach Article

Attribute-based Data Sharing Scheme in Cloud computing using Weight

by Akshay Choudhari, Emmanual M.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 6
Year of Publication: 2017
Authors: Akshay Choudhari, Emmanual M.
10.5120/ijca2017915767

Akshay Choudhari, Emmanual M. . Attribute-based Data Sharing Scheme in Cloud computing using Weight. International Journal of Computer Applications. 177, 6 ( Nov 2017), 14-19. DOI=10.5120/ijca2017915767

@article{ 10.5120/ijca2017915767,
author = { Akshay Choudhari, Emmanual M. },
title = { Attribute-based Data Sharing Scheme in Cloud computing using Weight },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2017 },
volume = { 177 },
number = { 6 },
month = { Nov },
year = { 2017 },
issn = { 0975-8887 },
pages = { 14-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number6/28629-2017915767/ },
doi = { 10.5120/ijca2017915767 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:45:07.683430+05:30
%A Akshay Choudhari
%A Emmanual M.
%T Attribute-based Data Sharing Scheme in Cloud computing using Weight
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 6
%P 14-19
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

To maintain data integrity on the cloud, Attribute-based Encryption (ABE) with Key Policy Attribute-based Encryption (KP-ABE) and Ciphertext-Policy Attribute-based Encryption (CP-ABE) can be used with access control implementation for cloud computing. CP-ABE is a promising cryptographic primitive for secure data sharing in cloud computing. A data owner is the only charge of to define the access policy associated with his data which to be shared. In CP-ABE, each user's secret keys are associated with a set of attributes and data are encrypted with access policy on attributes. A user can decrypt a ciphertext if and only if his attributes satisfy the ciphertext access policy. In CP-ABE, the secret keys of users have to be issued by a trusted key authority that leads to key escrow problem. Besides, most of the existing CP-ABE schemes cannot support attribute with an arbitrary state. In this paper, weighted-attribute data sharing scheme is proposed to solve the key escrow problem and also improve the expressiveness of attribute, so that the resulting scheme is friendlier to cloud computing applications. An improved two-party key issuing protocol guarantees that neither key authority nor cloud service provider can compromise the whole secret key of a user individually. The concept of weighted-attribute not only enhance the expression of an attribute binary to arbitrary but also reduce the complexity of access policy, so that storage cost of ciphertext and time cost in encryption can be reduced.

References
  1. T. Grance and P. Mell, "The NIST Defination of Cloud Computing", NIST, U.S., 2011.
  2. InformationWeek, "Why IT Needs To Push Data Sharing Efforts InformationWeek," 2015. [Online]. Available: http://www.informationweek.com/services/integration/why it needs to push data sharing effort/225700544.[Accessed: 27- Dec- 2015].
  3. Zhou M, Zhang R, Xie W, Qian W, Zhou A "Security and privacy in cloud computing: a survey." Sixth International conferences on Semantics knowledge and grid (SKG), pp. 105-112, 2010.
  4. D. Thilakanathan, S. Chen, S. Nepal and A. Rafael, “Secure Data Sharing in the Cloud," M. Pathan, S. Nepal, Security, Privacy and Trust in Cloud Systems, Springer- Verlag Berlin Heidelberg, 2014.
  5. A. Kahate, "Cryptography and Network Security," McGraw Hill, pp.38-198, 2016.
  6. Yogesh V Jilhawar, M Emmanuel,”Literature Survey on Different Cloud Computing Infrastructure-as-a-Service Frameworks”, Networking and Communication Engineering Journal, vol 7, issue-1, pp 26-29, 2015.
  7. S. Wang, K. Liang, J. Liu, J. Chen, W. Xie and J. Yu, "Attribute-Based Data Sharing Scheme Revisited in Cloud Computing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 8, pp. 1661-1673, 2016.
  8. J. Xiong, X. Liu, J. Ma, and G. Liu, "Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data," Int. J. Netw. Secur., vol. 16, no. 6, pp. 437–443, Nov. 2014.
  9. W. Susilo and K. Liang , "Searchable attribute-based mechanism with efficient data sharing for secure cloud storage,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 9, pp. 1981–1992, Sep. 2015.
  10. L. Cheung and C. Newport, “Provably secure ciphertext-policy ABE," in Proc. 14th ACM Conf. Comput. Commun. Secur., pp. 456–465, 2007.
  11. B. Waters and A. Sahai “Fuzzy identity-based encryption” Proc. 24th Annu. Int. Conf. Theory Appl. Cryptograph. Techn., pp. 457-473, 2005
  12. O. Pandey, V. Goyal, B. Waters, and A. Sahai. "Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data," Proc. 13th ACM Conf. Computer and Comm. Security (CCS ’06), pp. 89-98, 2006
  13. A. Sahai, B. Waters and J. Bethencourt "Ciphertext-policy attribute-based encryption" Proc. IEEE Symp. Secure. Privacy, pp. 321-334, May 2007
  14. S. S. M. Chow and M. Chase "Improving privacy and security in multi-authority attribute-based encryption” Proc. 16th ACM Conf. Comput. Commun. Secur., pp. 121-130, 2009.
  15. J. Hur “Improving security and efficiency in attribute-based data sharing” IEEE Trans. Knowl. Data Eng., vol. 25, no. 10, pp. 2271-2282, Oct. 2013
  16. X. Chen, X. Xie, H. Ma and J. Li "An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing" J. Universal Comput. Sci., vol. 19, no. 16, pp. 2349-2367, Oct. 2013
  17. S. Katzenbeisser, S. Müller, and C. Eckert, "Distributed attribute-based encryption,” in Proc. 11th Int.Conf. Inf. Secure Cryptol, pp.20– 36, 2009.
  18. C.-I. Fan, H.-M. Ruan and V. S.-M. Huang "Arbitrary-state attribute-based encryption with dynamic membership" IEEE Trans. Comput., vol. 63, no. 8, pp. 1951-1961, Aug. 2014
  19. J. Ma, X. Liu J. Xiong, Q. Li, and J. Ma, "Ciphertext-policy weighted attribute-based encryption for fine-grained access control," in Proc. 5th Int. Conf. Intell. Netw. Collaborative Syst., Sep., pp. 51–57, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Attribute-based Encryption Secure Data Sharing Weighted-Attribute