Security and Privacy Attribute Based Data Sharing in Public Cloud Storage



Public cloud storage is a cloud storage model that give services to people and associations to store, alter and oversee data. Public cloud storage benefit is otherwise called storage benefit, utility storage and online storage. Cloud storage has numerous focal points, there is still stay different difficulties among which protection and security of clients data have significant issues in public cloud storage. Attribute Based Encryption (ABE) is a cryptographic system which gives data proprietor coordinate control over their data in public cloud storage. In the customary ABE conspire include single authority to keep up attribute set which can bring a solitary point bottleneck on both security and execution. Presently we utilize edge multi-authority Cipher content Policy Attribute-Based Encryption (CP-ABE) get to control plot, name TMACS. TMACS is Threshold Multi-Authority Access Control System. In TMACS, different authority mutually deals with the entire attribute set yet nobody has full control of a particular attribute. By joining limit secret sharing (t,n) and multi-authority CP-ABE conspire, we created dynamic multiauthority get to control framework in public cloud storage.


Data Access Control; Auditing; CP-ABE; Cloud Storage;


KaipingXue ”RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage”, IEEE2016.

Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel & Distributed Systems, vol. 27, no. 9, pp. 2546–2559, 2016.

Z. Fu, X. Sun, S. Ji, and G. Xie, “Towards efficient content-aware search over encrypted outsourced data in cloud,” in in Proceedings of 2016 IEEE Conference on Computer Communications (INFOCOM 2016). IEEE, 2016, pp. 1–9.

K. Xue and P. Hong, “A dynamic secure group sharing framework in public cloud computing,” IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 459–470, 2014.

Y. Wu, Z. Wei, and H. Deng, “Attribute-based access to scalable media in cloud-assisted content sharing,” IEEE Transactions on Multimedia, vol. 15, no. 4, pp. 778–788, 2013.

J. Hur, “Improving security and efficiency in attributebased data sharing,” IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 10, pp. 2271– 2282, 2013.

J. Hur and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214–1221, 2011.

J. Hong, K. Xue, W. Li, and Y. Xue, “TAFC: Time and attribute factors combined access control on timesensitive data in public cloud,” in Proceedings of 2015 IEEE Global Communications Conference (GLOBECOM 2015). IEEE, 2015, pp. 1–6.

Y. Xue, J. Hong, W. Li, K. Xue, and P. Hong, “LABAC: A location-aware attribute-based access control scheme for cloud storage,” in Proceedings of 2016 IEEE Global Communications Conference (GLOBECOM 2016). IEEE, 2016, pp. 1–6.

A. Lewko and B. Waters, “Decentralizing attribute based encryption,” in Advances in Cryptology– EUROCRYPT 2011. Springer, 2011, pp. 568–588.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at