Abstract
With the rapid development of cloud computing, it is playing an increasingly important role in data sharing. Meanwhile, attribute-based encryption (ABE) has been an effective way to share data securely in cloud computing. In real circumstances, there is often a mutual access sub-policy in different providers’ access policies, and the significance of each attribute is usual diverse. In this paper, a secure and efficient data-sharing scheme in cloud computing, which is called unified ciphertext-policy weighted attribute-based encryption (UCP-WABE), is proposed. The weighted attribute authority assigns weights to attributes depending on their importance. The mutual information extractor extracts the mutual access sub-policy and generates the mutual information. Thus, UCP-WABE lowers the total encryption time cost of multiple providers. We prove that UCP-WABE is selectively secure on the basis of the security of ciphertext-policy weighted attribute-based encryption (CP-WABE). Additionally, the results of the implementation shows that UCP-WABE is efficient in terms of time.
Highlights
As one of the most promising applications, cloud computing [1,2,3] provides a more efficient way for data sharing
The theoretical efficiency analysis of UCP-WABE is first given, we carry out the experiments, and the results show that UCP-WABE has better efficiency than other schemes
We have proposed a novel UCP-WABE scheme for sharing data in cloud computing environments
Summary
As one of the most promising applications, cloud computing [1,2,3] provides a more efficient way for data sharing. Despite cloud computing supplying great convenience for data sharing, it brings the serious challenge of information security [4]. Massive data are stored in the cloud storage platforms, and the data often contain sensitive information, such as personal health records in the medical cloud [5,6,7] and banking transactions in the financial cloud [8,9,10]. An untrustworthy entity named the cloud service provider (CSP) runs the cloud storage platforms, and it may steal the sensitive information to make a profit. How to enforce a secure and efficient data sharing in the cloud has attracted many scholars’
Published Version (
Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have