Abstract
Cloud computing is a current phrase in marketing for an idea that has been recognized for years: Outsourcing. Cloud computing provides a large number of gratuities for each customer and enterprise agency. ‘Cloud model’ is more of a notion in which the data are hosted online and accessed at anytime-anywhere manner, on a pay-per-use model. However, the users may not fully trust the cloud service providers (CSPs) in that environment. So, it is hard to decide whether the cloud service provider (CSP) meets their expectations to provide the proper secrecy to users' shared data and privacy. Several access control schemes that allow, deny, or restrict users to have access to data have been proposed. Among these, the Attribute-Based Encryption (ABE) scheme has generally used to provide security efficiently in public managed cloud scheme storage. The earlier Attribute-Based Encryption (ABE) schemes have a single authority maintaining the whole attribute set and suffer from a single-point bottleneck problem. To resolve this issue, some Multi-Authority Attribute-Based Encryption (MA-ABE) schemes have proposed in which disjoint attribute sets are maintained separately, but the bottleneck problem still occurs. This paper involves multi-authority (MA) models, where multiple authorities mutually handle a uniform attribute set. It uses an efficient (t, n) threshold secret sharing scheme, in which n multiple authorities share the master key, and a legitimate user selects any t—out of n—authorities compute his/her secret_key. The results of security and performance analysis show that the proposed methodology is not only computationally secure whenever it is compromised by less than t—number of authorities, but still robust whenever at least t—number of authorities are active in the model. This paper uses an efficient encryption scheme to encrypt the plaintext message, which encrypts one byte at a time. It performs faster execution of encryption and reduces the hardware complexity.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Bernstein DJ (2008) ChaCha, a variant of Salsa20. In Workshop Record of SASC, vol 8
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07). IEEE, pp 321–334
Bobba R, Khurana H, Prabhakaran M (2009) Attribute-sets: a practically motivated enhancement to attribute-based encryption. European Symposium on Research in Computer Security. Springer, Berlin, pp 587–604
Boneh D, Lynn B, Shacham H (2004) Short signatures from the Weil pairing. J Crypt 17(4):297–319
Chase M (2007) Multi-authority attribute based encryption. Theory of cryptography conference. Springer, Berlin, pp 515–534
Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. International Colloquium on Automata, Languages, and Programming. Springer, Berling, pp 579–591
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security. ACM, pp 89–98
Hay B, Nance K, Bishop M (2011) Storm clouds rising: security challenges for IaaS cloud computing. In: 2011 44th Hawaii International Conference on System Sciences (HICSS). IEEE, pp. 1–7
Ito M, Saito A, Nishizeki T (1989) Secret sharing scheme realizing general access structure. Electron Commun Japan 72(9):56–64
Jung T, Li XY, Wan Z, Wan M (2013) Privacy preserving cloud data access with multi-authorities. In: INFOCOM, 2013 Proceedings IEEE. IEEE, pp 2625–2633
Kamara S, Lauter K (2010) Cryptographic cloud storage. International Conference on Financial Cryptography and Data Security. Springer, Berlin, pp 136–149
Khan AR (2012) Access control in cloud computing environment. ARPN J Eng Appl Sci 7(5):613–615
Lewko A, Waters B (2011) Decentralizing attribute-based encryption. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, pp 568–588
Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, pp 62–91
Li C, He J, Lei C, Guo C, Zhou K (2018) Achieving privacy-preserving CP-ABE access control with multi-cloud. In: 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom) (pp. 801–808). IEEE.
Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210
Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143
Li W, Xue K, Xue Y, Hong J (2016) TMACS: a robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Trans Parallel Distrib Syst 27(5):1484–1496
Li J, Chen X, Chow SS, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96
Liang Q, Wang YZ, Zhang YH (2013) Resource virtualization model using hybrid-graph representation and converging algorithm for cloud computing. Int J Autom Comput 10(6):597–606
Lin H, Cao Z, Liang X, Shao J (2010) Secure threshold multi authority attribute based encryption without a central authority. Inf Sci 180(13):2618–2632
Liu Z, Cao Z (2010) On efficiently transferring the linear secret-sharing scheme matrix in Ciphertext-policy attribute-based encryption. IACR Cryptology ePrint Archive 2010:374
Mell P, Grance T (2010) The NIST definition of cloud computing. Commun ACM 53(6):50
Onankunju BK (2013) Access control in cloud computing. Int J Sci Res Publications 3(9):1
Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on Computer and communications security. ACM, pp 195–203
Pedersen TP (1991) A threshold cryptosystem without a trusted party. Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, pp 522–526
Petrakis EG, Antonopoulos F, Sotiriadis S, Bessis N (2020) iPACS: a physical access control system as a service and mobile application. J Ambient Intell Hum Comput 11(3):929–943
Phuong TVX, Yang G, Susilo W (2015) Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans Inf Forensics Secur 11(1):35–45
Procter G (2014) A security analysis of the composition of ChaCha20 and Poly1305. IACR Cryptology ePrint Archive, p. 613.
Ramesh D, Priya R (2016) Multi-authority scheme based CP-ABE with attribute revocation for cloud data storage. In: 2016 International Conference on Microelectronics, Computing and Communications (MicroCom). IEEE, pp 1–4
Ramesh D, Mishra R, Edla DR (2017) Secure data storage in Cloud: an e-stream cipher-based secure and dynamic updation policy. Arab J Sci Eng 42(2):873–883
Ramesh D, Mishra R, Nayak BS (2016) Cha-Cha 20: Stream Cipher Based Encryption for Cloud Data Centre. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies. ACM, p 40
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, pp 457–473
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Ullah I, Ul Amin N, Zareei M, Zeb A, Khattak H, Khan A, Goudarzi S (2019) A lightweight and provable secured certificateless signcryption approach for crowdsourced IIoT applications. Symmetry 11(11):1386
Waheed A, Umar AI, Zareei M, Din N, Amin NU, Iqbal J et al (2020) Cryptanalysis and improvement of a proxy signcryption scheme in the standard computational model. IEEE Access 8:131188–131201
Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg, pp 53–70
Xue K, Xue Y, Hong J, Li W, Yue H, Wei DS, Hong P (2017) RAAC: Robust and auditable access control with multiple attribute authorities for public cloud storage. IEEE Trans Inf Forensics Secur 12(4):953–967
Xu Q, Tan C, Fan Z, Zhu W, Xiao Y, Cheng F (2018) Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption. IEEE Access 6:34051–34074
Yang K, Jia X, Ren K, Zhang B, Xie R (2013) DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans Inf Forensics Secur 8(11):1790–1801
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Infocom, 2010 proceedings IEEE. IEEE, pp 1–9
Zhang F, Chen J, Chen H, Zang B (2011) CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. ACM, pp 203–216
Zhang Z, Li C, Gupta BB, Niu D (2018) Efficient compressed ciphertext length scheme using multi-authority CP-ABE for hierarchical attributes. IEEE Access 6:38273–38284
Zhang J, Wang B, Xhafa F, Wang XA, Li C (2019) Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation. J Ambient Intell Hum Comput 10(2):429–438
Zhang Y, Wu A, Zheng D (2018) Efficient and privacy-aware attribute-based data sharing in mobile cloud computing. J Ambient Intell Hum Comput 9(4):1039–1048
Zhong H et al (2018) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22(1):243–251
Acknowledgment
This research work is supported by the Indian Institute of Technology (ISM), Dhanbad, Govt. of India. The authors wish to express their gratitude and heartiest thanks to the Department of Computer Science & Engineering, Indian Institute of Technology (ISM), Dhanbad, India, for providing their research support.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ramesh, D., Mishra, R. & Trivedi, M.C. PCS-ABE (t, n): a secure threshold multi authority CP-ABE scheme based efficient access control systems for cloud environment. J Ambient Intell Human Comput 12, 9303–9322 (2021). https://doi.org/10.1007/s12652-020-02643-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02643-2