FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

Secure and Reliable Data sharing scheme using Attribute-based Encryption with weighted attribute-based Encryption in Cloud Environment

Author(s): Chandrajeet Yadav, Vikash Yadav* and Jasvant Kumar

Publisher : FOREX Publication

Published : 30 September 2021

e-ISSN : 2347-470X

Page(s) : 48-56




Chandrajeet Yadav, CSE Department, Maharishi University of Information Technology, Lucknow, India

Vikash Yadav*, Department of Technical Education, Uttar Pradesh, India; Email: vikas.yadav.cs@gmail.com

Jasvant Kumar, Institute of Engineering and Technology, Lucknow, India

    [1] Zhou, Junwei, Hui Duan, Kaitai Liang, Qiao Yan, Fei Chen, F. Richard Yu, Jieming Wu, and Jianyong Chen. "Securing outsourced data in the multi-authority cloud with fine-grained access control and efficient attribute revocation." The Computer Journal 60, no. 8 (2017): 1210-1222.
    [2] Balusamy, Balamurugan, P. Venkata Krishna, GS Tamizh Arasi, and Victor Chang. "A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System." IJ Network Security 19, no. 4 (2017): 559-572.
    [3] Namasudra, Suyel, Pinki Roy, Pandi Vijayakumar, Sivaraman Audithan, and Balamurugan Balusamy. "Time efficient secure DNA based access control model for cloud computing environment." Future Generation Computer Systems 73 (2017): 90-105.
    [4] Namasudra, Suyel, Rupak Chakraborty, Abhishek Majumder, and Nageswara Rao Moparthi. "Securing Multimedia by Using DNA-Based Encryption in the Cloud Computing Environment." ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 16, no. 3s (2020): 1-19.
    [5] Wadhwa, Amit, and Vinod Kumar Gupta. "Proposed Framework with Comparative Analysis of Access Control & Authentication based Security Models Employed over Cloud." International Journal of Applied Engineering Research 12, no. 24 (2017): 15715-15722.
    [6] Chandrajeet Yadav, Vikash Yadav et al, “AES-Light Weight CP–ABE Based Privacy Protection Framework with Effective Access Control Mechanism in Cloud Framework”, Design Engineering, Rogers Media Publishing Ltd., ISSN 0011-9342, Vol. 2021, No. 6, pp. 2321-2336, June 2021.
    [7] Shen, Rui, and Xuejun Zhu. "The Research on Multi-Authority Based Weighted Attribute Encryption Algorithm in the Cloud Computing Environment." In 4th International Conference on Computer, Mechatronics, Control and Electronic Engineering. Atlantis Press, 2015.
    [8] Wang, Shulan, Kaitai Liang, Joseph K. Liu, Jianyong Chen, Jianping Yu, and Weixin Xie. "Attribute-based data sharing scheme revisited in cloud computing." IEEE Transactions on Information Forensics and Security 11, no. 8 (2016): 1661-1673.
    [9] Zhang, Wenfeng, and Shiqi Jin. "Research and Application of Data Privacy Protection Technology in Cloud Computing Environment Based on Attribute Encryption." In 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), pp. 994-996. IEEE, 2020.
    [10] Qian, He, Song Jing, Xu Hong, and Wang Yong. "HABEm: Hierarchical Attribute Based Encryption with Multi-Authority for the Mobile Cloud Service." In 2020 IEEE/CIC International Conference on Communications in China (ICCC), pp. 524-529. IEEE, 2020.
    [11] Chaudhry, Shehzad Ashraf, Hosam Alhakami, Abdullah Baz, and Fadi Al-Turjman. "Securing demand response management: A certificate-based access control in smart grid edge computing infrastructure." IEEE Access 8 (2020): 101235-101243.
    [12] Muthurajkumar, Sannasy, Muthuswamy Vijayalakshmi, and Arputharaj Kannan. "Secured data storage and retrieval algorithm using map reduce techniques and chaining encryption in cloud databases." Wireless Personal Communications 96, no. 4 (2017): 5621-5633.
    [13] Alam, Masoom, Naina Emmanuel, Tanveer Khan, Yang Xiang, and Houcine Hassan. "Garbled role-based access control in the cloud." Journal of Ambient Intelligence and Humanized Computing 9, no. 4 (2018): 1153-1166.
    [14] Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encryption data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 October–3 November 2006; pp. 89–98.
    [15] Bertino, Elisa, Claudio Bettini, Elena Ferrari, and Pierangela Samarati. "A temporal access control mechanism for database systems." IEEE Transactions on knowledge and data engineering 8, no. 1 (1996): 67-80.
    [16] Naor, Moni, and Avishai Wool. "Access control and signatures via quorum secret sharing." IEEE Transactions on Parallel and Distributed Systems 9, no. 9 (1998): 909-922.
    [17] Sahai, Amit, and Brent Waters. "Fuzzy identity-based encryption." In Annual international conference on the theory and applications of cryptographic techniques, pp. 457-473. Springer, Berlin, Heidelberg, 2005.
    [18] Mayur Rahul, Vikash Yadav et al, “A Survey on State-of-the-art of Cloud Computing, its Challenges and Solutions”, International Conference on “Recent Trends in Communication & Electronics (ICCE-2020), Ghaziabad, November 28-29, 2020.
    [19] Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, 2007. SP’07. IEEE, pp 321–334.
    [20] Chen C, Chen J, Lim HW, Zhang Z, Feng D, Ling S, Wang H (2013) Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures. In: CT-RSA. Springer, pp 50–67.
    [21] Doshi N, Jinwala DC (2014) Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption. Secur Commun Netw 7(11):1988–2002.
    [22] Emura K, Miyaji A, Nomura A, Omote K, Soshi M (2009) A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: ISPEC, vol 9. Springer, pp 13–23.
    [23] Herranz J, Laguillaumie F, Ràfols C (2010) Constant size ciphertexts in threshold attribute-based encryption. Public Key Cryptogr PKC 2010:19–34.
    [24] Zhang Y, Zheng D, Chen X, Li J, Li H (2014) Computationally efficient ciphertext-policy attributebased encryption with constant-size ciphertexts. In: International conference on provable security. Springer, pp 259–273.
    [25] Zhou Z, Huang D (2010) On efficient ciphertext-policy attribute based encryption and broadcast encryption. In: Proceedings of the 17th ACM conference on computer and communications security. ACM, pp 753–755.
    [26] Guo F, Mu Y, Susilo W, Wong DS, Varadharajan V (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf Forensics Secur 9(5):763–771.
    [27] Odelu V, Das AK, Rao YS, Kumari S, Khan MK, Choo KKR (2017) Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput Stand Interfaces 54:3–9.
    [28] K. Liang, J. K. Liu, D. S. Wong, and W. Susilo, ‘‘An efficient cloudbased revocable identity-based proxy re-encryption scheme for public clouds data sharing,’’ in Proc. Eur. Symp. Res. Comput. Secur. (EROSICS), Wroclaw, Poland, 2014, pp. 257–272.
    [29] Y. Kawai, ‘‘Outsourcing the re-encryption key generation: Flexible ciphertext-policy attribute-based proxy re-encryption,’’ in Proc. Int. Conf. Inf. Secur. Pract. Exper. (ISPEC), vol. 9065. Cham, Switzerland: Springer, 2015, pp. 301–315.
    [30] S. Fugkeaw and H. Sato, ‘‘Embedding lightweight proxy re-encryption for efficient attribute revocation in cloud computing,’’ J. High Perform. Computer Network, vol. 9, no. 4, pp. 299–309, 2016
    [31] Li, Ming, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou. "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption." IEEE transactions on parallel and distributed systems 24, no. 1 (2012): 131-143.
    [32] Subashini, Subashini, and Veeraruna Kavitha. "A survey on security issues in service delivery models of cloud computing." Journal of network and computer applications 34, no. 1 (2011): 1-11.
    [33] Jain, Raj. "Advanced encryption standard (AES)." Washington University in Saint Louis, St. Louis (2017).
    [34] Sun, Guo-Zi, D. O. N. G. Yu, and L. I. Yun. "CP-ABE based data access control for cloud storage." Journal on Communications 32, no. 7 (2011): 146.
    [35] Huang, Qinlong, Yixian Yang, and Mansuo Shen. "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing." Future Generation Computer Systems 72 (2017): 239-249.

Chandrajeet Yadav, Vikash Yadav and Jasvant Kumar (2021), Secure and Reliable Data sharing scheme using Attribute-based Encryption with weighted attribute-based Encryption in Cloud Environment . IJEER 9(3), 48-56. DOI: 10.37391/IJEER.090305.