A Privacy Preserving and Efficient Multi Authority – CP-ABE Scheme for Secure Cloud Communication

Authors

  • Shardha Porwal Department of Computer Science Engineering & Information Technology, Jaypee Institute of Information Technology, Noida, India https://orcid.org/0000-0002-2230-8466
  • Sangeeta Mittal Department of Computer Science Engineering & Information Technology, Jaypee Institute of Information Technology, Noida, India https://orcid.org/0000-0002-8323-7681

DOI:

https://doi.org/10.13052/jcsm2245-1439.945

Keywords:

MA-CP-ABE, hidden access policy, constant length ciphertext, corrupt resistant, key escrow free

Abstract

In the cloud computing environment, Multi authority Ciphertext Policy-Attribute Based Encryption (CP-ABE) schemes are used as a key escrow free solution to securely and efficiently share data over cloud. However, the length of ciphertext in existing Multi Authority-CP-ABE schemes increases with the number of attributes in the access policy. Moreover, these schemes do not protect against dishonest attribute authorities. In this paper, a constant length ciphertext Multi Authority-CP-ABE scheme is proposed that reduces the communication overhead over the network. The scheme also prevents dishonest authority from compromising the system. Apart from this, for enhanced privacy of receivers, the access policy is communicated in hidden form. Thus, the presented scheme provides an efficient corrupt resistant, key escrow free Multi Authority-CP-ABE scheme by generating constant length ciphertext and hidden access structure. Results demonstrate the enhanced security and reduced cost of encryption and decryption by 8% and 48% respectively as compared to other existing works.

Downloads

Download data is not yet available.

Author Biographies

Shardha Porwal, Department of Computer Science Engineering & Information Technology, Jaypee Institute of Information Technology, Noida, India

Shardha Porwal is Assistant Professor in department of computer science engineering and information technology in Jaypee Institute of Information Technology, Noida. Her research interest includes Cryptography and Network Security, Data structure and algorithm. She has published several papers in international conferences and journals. She received her M.Tech. degree from Maulana Azad National Institute of Technology, Bhopal, India. She has 10+ years of teaching experience.

Sangeeta Mittal, Department of Computer Science Engineering & Information Technology, Jaypee Institute of Information Technology, Noida, India

Sangeeta Mittal is Associate Professor in Jaypee Institute of Information Technology, Noida. Her areas of research interest include Software Defined Networks, Computer Networks, Network Security, Cryptography, Sensor Based Smart Environments and Wireless Sensor Networks. She has published several papers in international conferences and journals of repute. She earned her PhD from Jaypee Institute of Information Technology, M.E. in Computer Engineering from Punjab University Chandigarh India and BE from Maharishi Dayanand University, Rohtak, India. She has 16+ years of experience in teaching UG and PG computer science courses. She is a member of ACM and life member of CSI.

References

Sahai A. and Waters B., “Fuzzy identity-based encryption”, in Proc. EUROCRYPT, 2005, vol. 3494, pp. 457–473.

Goyal V., Pandey O., Sahai A., Waters B., “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data”, Proceedings of the 13th ACM conference on Computer and communications security, Pages 89-98, Alexandria, Virginia, USA — October 30–November 03, 2006. (cited by 3142)

Bethencourt J., Sahai A., and Waters B., “Ciphertext-Policy Attribute-Based Encryption”, 28th IEEE Symposium on Security and Privacy (Oakland), May 2007.

Cheung, Ling, and Calvin Newport. “Provably secure ciphertext policy ABE.” Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007.

Chase M. Multi-authority attribute based encryption. In Theory of cryptography conference 2007 Feb 21 (pp. 515–534). Springer, Berlin, Heidelberg.

Lin H, Cao Z, Liang X, Shao J. Secure threshold multi authority attribute based encryption without a central authority. InInternational Conference on Cryptology in India 2008 Dec 14 (pp. 426–436). Springer, Berlin, Heidelberg.

Nishide, Takashi, Kazuki Yoneyama, and Kazuo Ohta. “Attribute-based encryption with partially hidden encryptor-specified access structures.” International conference on applied cryptography and network security. Springer, Berlin, Heidelberg, 2008.

Emura, Keita, et al. “A ciphertext-policy attribute-based encryption scheme with constant ciphertext length.” International Conference on Information Security Practice and Experience. Springer, Berlin, Heidelberg, 2009.

Muller S, Katzenbeisser S, Eckert C. On multi-authority ciphertext-policy attribute-based encryption. Bulletin of the Korean Mathematical Society. 2009;46(4):803–19.

Chase M, Chow SS. Improving privacy and security in multi-authority attribute-based encryption. In Proceedings of the 16th ACM conference on Computer and communications security 2009 Nov 9 (pp. 121–130). ACM.

Doshi N, Jinwala D. Constant ciphertext length in multi-authority ciphertext policy attribute based encryption. In 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011) 2011 Sep 15 (pp. 451–456). IEEE.

Luo E, Liu Q, Wang G. Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Communications Letters. 2016 Jun 23;20(9):1772–5.

Zhong H, Zhu W, Xu Y, Cui J. Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Computing. 2018 Jan 1;22(1):243–51.

Vaanchig N, Xiong H, Chen W, Qin Z. Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation. IJ Network Security. 2018 Jan 1;20(1):95–109.

Ling J, Weng AX. A scheme of hidden-structure attribute-based encryption with multiple authorities. In IOP Conference Series: Materials Science and Engineering 2018 May (Vol. 359, No. 1, p. 012005). IOP Publishing.

Chandrasekaran B, Nogami Y, Balakrishnan R. An Efficient Hierarchical Multi-Authority Attribute Based Encryption Scheme for Profile Matching using a Fast Ate Pairing in Cloud Environment. Journal of communications software and systems, vol. 14, no. 2, June 2018.

Zhang Y, Li J, Yan H. Constant Size Ciphertext Distributed CP-ABE Scheme with Privacy Protection and Fully Hiding Access Structure. IEEE Access. 2019 Apr 4;7:47982–90.

Challagidad, P.S. and Birje, M.N., 2020. Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage. Procedia Computer Science, 167, pp. 840–849.

Dixit, S., Joshi, K.P. and Choi, S.G., 2019, July. Multi Authority Access Control in a Cloud EHR System with MA-ABE. In 2019 IEEE International Conference on Edge Computing (EDGE) (pp. 107–109). IEEE.

Li, J., Zhang, Y., Ning, J., Huang, X., Poh, G.S. and Wang, D., 2020. Attribute based encryption with privacy protection and accountability for CloudIoT. IEEE Transactions on Cloud Computing.

De Caro A, Iovino V. jPBC: Java pairing based cryptography. In2011 IEEE symposium on computers and communications (ISCC) 2011 Jun 28 (pp. 850–855). IEEE.

Downloads

Published

2021-02-09

How to Cite

1.
Porwal S, Mittal S. A Privacy Preserving and Efficient Multi Authority – CP-ABE Scheme for Secure Cloud Communication. JCSANDM [Internet]. 2021 Feb. 9 [cited 2024 Nov. 17];9(4):601-26. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/4789

Issue

Section

Articles

Most read articles by the same author(s)