Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

PCS-ABE (t, n): a secure threshold multi authority CP-ABE scheme based efficient access control systems for cloud environment

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Cloud computing is a current phrase in marketing for an idea that has been recognized for years: Outsourcing. Cloud computing provides a large number of gratuities for each customer and enterprise agency. ‘Cloud model’ is more of a notion in which the data are hosted online and accessed at anytime-anywhere manner, on a pay-per-use model. However, the users may not fully trust the cloud service providers (CSPs) in that environment. So, it is hard to decide whether the cloud service provider (CSP) meets their expectations to provide the proper secrecy to users' shared data and privacy. Several access control schemes that allow, deny, or restrict users to have access to data have been proposed. Among these, the Attribute-Based Encryption (ABE) scheme has generally used to provide security efficiently in public managed cloud scheme storage. The earlier Attribute-Based Encryption (ABE) schemes have a single authority maintaining the whole attribute set and suffer from a single-point bottleneck problem. To resolve this issue, some Multi-Authority Attribute-Based Encryption (MA-ABE) schemes have proposed in which disjoint attribute sets are maintained separately, but the bottleneck problem still occurs. This paper involves multi-authority (MA) models, where multiple authorities mutually handle a uniform attribute set. It uses an efficient (t, n) threshold secret sharing scheme, in which n multiple authorities share the master key, and a legitimate user selects any t—out of n—authorities compute his/her secret_key. The results of security and performance analysis show that the proposed methodology is not only computationally secure whenever it is compromised by less than t—number of authorities, but still robust whenever at least t—number of authorities are active in the model. This paper uses an efficient encryption scheme to encrypt the plaintext message, which encrypts one byte at a time. It performs faster execution of encryption and reduces the hardware complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Bernstein DJ (2008) ChaCha, a variant of Salsa20. In Workshop Record of SASC, vol 8

  • Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07). IEEE, pp 321–334

  • Bobba R, Khurana H, Prabhakaran M (2009) Attribute-sets: a practically motivated enhancement to attribute-based encryption. European Symposium on Research in Computer Security. Springer, Berlin, pp 587–604

    Google Scholar 

  • Boneh D, Lynn B, Shacham H (2004) Short signatures from the Weil pairing. J Crypt 17(4):297–319

    Article  MathSciNet  Google Scholar 

  • Chase M (2007) Multi-authority attribute based encryption. Theory of cryptography conference. Springer, Berlin, pp 515–534

    Chapter  Google Scholar 

  • Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. International Colloquium on Automata, Languages, and Programming. Springer, Berling, pp 579–591

    Chapter  Google Scholar 

  • Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security. ACM, pp 89–98

  • Hay B, Nance K, Bishop M (2011) Storm clouds rising: security challenges for IaaS cloud computing. In: 2011 44th Hawaii International Conference on System Sciences (HICSS). IEEE, pp. 1–7

  • Ito M, Saito A, Nishizeki T (1989) Secret sharing scheme realizing general access structure. Electron Commun Japan 72(9):56–64

    Article  MathSciNet  Google Scholar 

  • Jung T, Li XY, Wan Z, Wan M (2013) Privacy preserving cloud data access with multi-authorities. In: INFOCOM, 2013 Proceedings IEEE. IEEE, pp 2625–2633

  • Kamara S, Lauter K (2010) Cryptographic cloud storage. International Conference on Financial Cryptography and Data Security. Springer, Berlin, pp 136–149

    Chapter  Google Scholar 

  • Khan AR (2012) Access control in cloud computing environment. ARPN J Eng Appl Sci 7(5):613–615

    Google Scholar 

  • Lewko A, Waters B (2011) Decentralizing attribute-based encryption. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, pp 568–588

    Google Scholar 

  • Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, pp 62–91

    MATH  Google Scholar 

  • Li C, He J, Lei C, Guo C, Zhou K (2018) Achieving privacy-preserving CP-ABE access control with multi-cloud. In: 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom) (pp. 801–808). IEEE.

  • Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210

    Article  Google Scholar 

  • Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143

    Article  Google Scholar 

  • Li W, Xue K, Xue Y, Hong J (2016) TMACS: a robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Trans Parallel Distrib Syst 27(5):1484–1496

    Article  Google Scholar 

  • Li J, Chen X, Chow SS, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96

    Article  Google Scholar 

  • Liang Q, Wang YZ, Zhang YH (2013) Resource virtualization model using hybrid-graph representation and converging algorithm for cloud computing. Int J Autom Comput 10(6):597–606

    Article  Google Scholar 

  • Lin H, Cao Z, Liang X, Shao J (2010) Secure threshold multi authority attribute based encryption without a central authority. Inf Sci 180(13):2618–2632

    Article  MathSciNet  Google Scholar 

  • Liu Z, Cao Z (2010) On efficiently transferring the linear secret-sharing scheme matrix in Ciphertext-policy attribute-based encryption. IACR Cryptology ePrint Archive 2010:374

    Google Scholar 

  • Mell P, Grance T (2010) The NIST definition of cloud computing. Commun ACM 53(6):50

    Google Scholar 

  • Onankunju BK (2013) Access control in cloud computing. Int J Sci Res Publications 3(9):1

    Google Scholar 

  • Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on Computer and communications security. ACM, pp 195–203

  • Pedersen TP (1991) A threshold cryptosystem without a trusted party. Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, pp 522–526

    Google Scholar 

  • Petrakis EG, Antonopoulos F, Sotiriadis S, Bessis N (2020) iPACS: a physical access control system as a service and mobile application. J Ambient Intell Hum Comput 11(3):929–943

    Article  Google Scholar 

  • Phuong TVX, Yang G, Susilo W (2015) Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans Inf Forensics Secur 11(1):35–45

    Article  Google Scholar 

  • Procter G (2014) A security analysis of the composition of ChaCha20 and Poly1305. IACR Cryptology ePrint Archive, p. 613.

  • Ramesh D, Priya R (2016) Multi-authority scheme based CP-ABE with attribute revocation for cloud data storage. In: 2016 International Conference on Microelectronics, Computing and Communications (MicroCom). IEEE, pp 1–4

  • Ramesh D, Mishra R, Edla DR (2017) Secure data storage in Cloud: an e-stream cipher-based secure and dynamic updation policy. Arab J Sci Eng 42(2):873–883

    Article  MathSciNet  Google Scholar 

  • Ramesh D, Mishra R, Nayak BS (2016) Cha-Cha 20: Stream Cipher Based Encryption for Cloud Data Centre. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies. ACM, p 40

  • Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, pp 457–473

  • Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  Google Scholar 

  • Ullah I, Ul Amin N, Zareei M, Zeb A, Khattak H, Khan A, Goudarzi S (2019) A lightweight and provable secured certificateless signcryption approach for crowdsourced IIoT applications. Symmetry 11(11):1386

    Article  Google Scholar 

  • Waheed A, Umar AI, Zareei M, Din N, Amin NU, Iqbal J et al (2020) Cryptanalysis and improvement of a proxy signcryption scheme in the standard computational model. IEEE Access 8:131188–131201

    Article  Google Scholar 

  • Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg, pp 53–70

  • Xue K, Xue Y, Hong J, Li W, Yue H, Wei DS, Hong P (2017) RAAC: Robust and auditable access control with multiple attribute authorities for public cloud storage. IEEE Trans Inf Forensics Secur 12(4):953–967

    Article  Google Scholar 

  • Xu Q, Tan C, Fan Z, Zhu W, Xiao Y, Cheng F (2018) Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption. IEEE Access 6:34051–34074

    Article  Google Scholar 

  • Yang K, Jia X, Ren K, Zhang B, Xie R (2013) DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans Inf Forensics Secur 8(11):1790–1801

    Article  Google Scholar 

  • Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Infocom, 2010 proceedings IEEE. IEEE, pp 1–9

  • Zhang F, Chen J, Chen H, Zang B (2011) CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. ACM, pp 203–216

  • Zhang Z, Li C, Gupta BB, Niu D (2018) Efficient compressed ciphertext length scheme using multi-authority CP-ABE for hierarchical attributes. IEEE Access 6:38273–38284

    Article  Google Scholar 

  • Zhang J, Wang B, Xhafa F, Wang XA, Li C (2019) Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation. J Ambient Intell Hum Comput 10(2):429–438

    Article  Google Scholar 

  • Zhang Y, Wu A, Zheng D (2018) Efficient and privacy-aware attribute-based data sharing in mobile cloud computing. J Ambient Intell Hum Comput 9(4):1039–1048

    Article  Google Scholar 

  • Zhong H et al (2018) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22(1):243–251

    Article  Google Scholar 

Download references

Acknowledgment

This research work is supported by the Indian Institute of Technology (ISM), Dhanbad, Govt. of India. The authors wish to express their gratitude and heartiest thanks to the Department of Computer Science & Engineering, Indian Institute of Technology (ISM), Dhanbad, India, for providing their research support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dharavath Ramesh.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ramesh, D., Mishra, R. & Trivedi, M.C. PCS-ABE (t, n): a secure threshold multi authority CP-ABE scheme based efficient access control systems for cloud environment. J Ambient Intell Human Comput 12, 9303–9322 (2021). https://doi.org/10.1007/s12652-020-02643-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02643-2

Keywords

Navigation