Encrypted Data Sharing in Cloud data storage using Cloud Computing



To ensure confidentiality, data owners outsource encrypted data instead of plaintexts. To share the encrypted files with other users, Ciphertext-Policy Attribute-based Encryption (CP-ABE) can be utilized to conduct fine-grained and owner-centric access control. But this does not sufficiently become secure against other attacks. Many previous schemes did not grant the cloud provider the capability to verify whether a downloader can decrypt. Therefore, these files should be available to everyone accessible to the cloud storage. which will largely consume the cloud resource. The payer of the cloud service bears the expense. Besides, the cloud provider serves both as the accountant and the payee of resource consumption fee, lacking the transparency to data owners. These concerns should be resolved in real-world public cloud storage. In this paper, we propose a solution to secure encrypted cloud storages and provide resource consumption accountability. It uses CP-ABE schemes in a black-box manner and complies with arbitrary access policy of CP-ABE. We present two protocols for different settings, followed by performance and security analysis.


Cloud Service Provider; Cp-Abe; Access Strategy; Cloud Storage;


C. Chu, W. T. Zhu, J. Han, J. K. Liu, J. Xu, and J. Zhou, “Securityconcerns in popular cloud storage services,”vol. 12, no. 4, pp. 50–57, October-December 2013.

T. Jiang, X. Chen, J. Li, D. S. Wong, J. Ma, and J. K. Liu, “TIMER: secureand reliable cloud storage against data re-outsourcing,” vol. 8434, pp. 346–358, May 2014.

K. Liang, J. K. Liu, D. S. Wong, and W. Susilo, “An efficient cloudbasedrevocable identity-based proxy re-encryption scheme for public clouds data sharing,” vol. 8712,September 2014.

T. H. Yuen, Y. Zhang, S. Yiu, and J. K. Liu, “Identity-based encryptionwith post-challenge auxiliary inputs for secure cloud applications andsensor networks,” vol. 8712, pp.130–147, September 2014.

K. Liang, M. H. Au, J. K. Liu, W. Susilo, D. S. Wong, G. Yang, T. V. X.Phuong, and Q. Xie, “A DFA-based functional proxy reencryptionscheme for secure public cloud data sharing,” vol. 9, no. 10, pp. 1667–1680,October 2014

T. H. Yuen, J. K. Liu, M. H. Au, X. Huang, W. Susilo, and J. Zhou, “ktimesattribute-based anonymous access control for cloud computing,” vol. 64, no. 9, pp. 2595–2608,September 2015.

S.Saravanan, Arivarasan.”An efficient ranked keyword search for effective utilization of outsourced cloud data” Journal of Global Research in Computer Science, Vol4(4), pp:8-12

S Saravanan, V Venkatachalam ,“ Improving map reduce task scheduling and micro-partitioning mechanism for mobile cloud multimedia services” International Journal of Advanced Intelligence Paradigms ,Vol 8(2),pp157- 167,2016.

S Saravanan, V Venkatachalam ,“ Advance Map Reduce Task Scheduling algorithm using mobile cloud multimedia services architecture” IEEE Digital Explore,pp21-25,2014.

S.Swathi “Preemptive Virtual Machine Scheduling Using CLOUDSIM Tool”, International Journal of Advances in Engineering, 2015, 1(3), 323 -327 ISSN: 2394-9260, pp:323-327.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.