Decentralizing Multi-Authority Attribute-based Data Sharing Scheme in Cloud computing



To maintain data integrity on the cloud, Attribute-based Encryption (ABE) with Key Policy Attribute-based Encryption (KP-ABE) and Ciphertext-Policy Attribute-based Encryption (CP-ABE) can be used with access control implementation for cloud computing. CP-ABE is a promising cryptographic primitive for secure data sharing in cloud computing. A data owner is the only charge of to define the access policy associated with his data which to be shared. In CP-ABE, each user's secret keys are associated with a set of attributes and data are encrypted with access policy on attributes. A user can decrypt a ciphertext if and only if his attributes satisfy the ciphertext access policy. In CP-ABE, the secret keys of users have to be issued by a trusted key authority that leads to key escrow problem. Besides, most of the existing CP-ABE schemes cannot support attribute with an arbitrary state. In this paper, weighted-attribute data sharing scheme is proposed to solve the key escrow problem and also improve the expressiveness of attribute, so that the resulting scheme is friendlier to cloud computing applications. An improved two-party key issuing protocol guarantees that neither key authority nor cloud service provider can compromise the whole secret key of a user individually. The concept of weighted-attribute not only enhance the expression of an attribute binary to arbitrary but also reduce the complexity of access policy, so that storage cost of ciphertext and time cost in encryption can be reduced.


Cloud Computing; Attribute-based Encryption; Secure Data Sharing; Weighted-Attribute ;


T. Grance and P. Mell, "The NIST Defination of Cloud Computing", NIST, U.S., 2011.

InformationWeek, "Why IT Needs To Push Data Sharing Efforts InformationWeek," 2015. [Online]. Available: it needs to push data sharing effort/225700544.[Accessed: 27- Dec- 2015].

Zhou M, Zhang R, Xie W, Qian W, Zhou A "Security and privacy in cloud computing: a survey." Sixth International conferences on Semantics knowledge and grid (SKG), pp. 105-112, 2010.

D. Thilakanathan, S. Chen, S. Nepal and A. Rafael, “Secure Data Sharing in the Cloud," M. Pathan, S. Nepal, Security, Privacy and Trust in Cloud Systems, Springer- Verlag Berlin Heidelberg, 2014.

A. Kahate, "Cryptography and Network Security," McGraw Hill, pp.38-198, 2016.

Yogesh V Jilhawar, M Emmanuel,”Literature Survey on Different Cloud Computing Infrastructure-as-a-Service Frameworks”, Networking and Communication Engineering Journal, vol 7, issue-1, pp 26-29, 2015.

S. Wang, K. Liang, J. Liu, J. Chen, W. Xie and J. Yu, "Attribute-Based Data Sharing Scheme Revisited in Cloud Computing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 8, pp. 1661-1673, 2016.

J. Xiong, X. Liu, J. Ma, and G. Liu, "Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data," Int. J. Netw. Secur., vol. 16, no. 6, pp. 437–443, Nov. 2014.

W. Susilo and K. Liang , "Searchable attribute-based mechanism with efficient data sharing for secure cloud storage,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 9, pp. 1981–1992, Sep. 2015.

L. Cheung and C. Newport, “Provably secure ciphertextpolicy ABE," in Proc. 14th ACM Conf. Comput. Commun. Secur., pp. 456–465, 2007. IJCATM :

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at