Abstract

It is the most important and challenging problem to share the data safely in cloud computing. Some so-called trusted third parties may also infringe users’ data privacy. It is an urgent problem for data owners to share data safely with the designated users rather than the third party or other users. Traditional encryption schemes utilize different keys to produce multiple encrypted copies of the same data for users. It is no longer applicable for cloud data sharing security. Attribute-based encryption can solve above problems, but it needs to rely on trusted third parties to protect the users’ privacy. In this article, in order to address the above problems, we propose a blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data secure sharing without relying on any trusted third parties. Blockchain-based ciphertext-policy attribute-based encryption scheme can protect the rights and security of data owner. Compared with existing cloud security schemes, the proposed scheme has more advantages in terms of the six aspects: (1) data owners have the authority to decide who can decrypt the data; (2) the operations of users are retained permanently, and all records are tamper-proof; (3) our proposed scheme has the characteristic of “one-to-many” encryption, and data is encrypted only once; (4) our scheme does not rely on any trusted third party; (5) in terms of the discrete logarithm problem and decisional q parallel-bilinear Diffie–Hellman exponent problem, we prove that our proposed scheme is secure; and (6) experiment shows that our proposed scheme is more efficient than the comparative scheme.

Highlights

  • Cloud computing[1,2] provides cost-effective and powerful data storage and management service on the Internet

  • We prove that our proposed scheme is secure based on Discrete Logarithm (DL) assumption and decisional q parallel-bilinear Diffie–Hellman exponent (BDHE) assumption

  • We propose the BCAS cloud data sharing security scheme without any trusted third party

Read more

Summary

Introduction

Cloud computing[1,2] provides cost-effective and powerful data storage and management service on the Internet. In the CP-ABE scheme, ciphertext is associated with an access policy, while the user’s decryption key is identified by a set of descriptive attributes. The Setup algorithm takes as input the security parameter l and the unique description of the attributes universe U It outputs the public parameter PK and the master key MK. The Encrypt algorithm takes as input the public parameters PK, a message M, and an access structure A over the universe of attributes. The algorithm will encrypt M and output a ciphertext CT such that only a user who possesses a set of attributes satisfying the access structure will be able to decrypt the message. The Decrypt algorithm takes as input the public parameters PK, a ciphertext CT which contains an access policy A and a private key SK. The blockchain technology is used to protect cloud data security.[16]

Related work
Background
4: DecKeyGen 5 6
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.