Skip to main content
Log in

Deep multilayer percepted policy attribute Lamport certificateless signcryption for secure data access and sharing in cloud

  • Published:
Distributed and Parallel Databases Aims and scope Submit manuscript

Abstract

Data sharing is a method that allows users to legally access data over the cloud. Cloud computing architecture is used to enable the data sharing capabilities only to the authorized users from the data stored in the cloud server. In the cloud, the number of users is extremely large and the users connect and leave randomly hence that the system needs to protect the data access. Many algorithms have been reviewed but the most challenging issue in cloud computing is a data-sharing system and access policy for an authorized user. A novel technique called Deep Multilayer Percepted Policy Attribute Lamport Certificateless Signcryption (DMPPALCS) is introduced for improving the security level of data access in the cloud with multiple layers. Initially, the users register their details to the cloud server for retrieving the numerous services. After that the cloud server generates the private and public keys for each registered user using Lamport Certificateless Signcryption. After the key generation, the user sends a request to the cloud server for acquiring the data. The cloud server validates that the requested user is authorized or not based on the policy attributes. Then the cloud server facilities the user requested data in the form of ciphertext and generates the signature to the cloud user. Finally, the signature is verified at the user side to decrypt the data. If the signature is valid, then the authorized users obtain the original data and improve secure data access. The proposed DMPPALCS technique is used for evaluating various security parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Sethi, K., Pradhan, A., Bera, P.: Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation. J. Inf. Secur. Appl. 51, 1–16 (2020)

    Google Scholar 

  2. Xiong, H., Zhang, H., Sun, J.: Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Syst. J. 13(3), 2739–2750 (2019)

    Article  Google Scholar 

  3. Mythili, R., Venkataraman, R., Sai Raj, T.: An attribute-based lightweight cloud data access control using hypergraph structure. J. Supercomput. 76, 6040–6064 (2020)

    Article  Google Scholar 

  4. Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. J. Syst. Archit. 102, 1–11 (2020)

    Article  Google Scholar 

  5. Rao, K.R., Ra, I.G., Asif, W., Nayak, A., Rajarajan, M.: R-PEKS: RBAC enabled PEKS for secure access of cloud data. IEEE Access 7, 133274–133289 (2019)

    Article  Google Scholar 

  6. Eltayieb, N., Wang, P., Hassan, A., Elhabob, R., Li, F.: ASDS: attribute-based secure data sharing scheme for reliable cloud environment. Secur. Priv. 2(2), 1–11 (2019)

    Google Scholar 

  7. Tiwari, D., Gangadharan, G.R.: SecCloudSharing: secure data sharing in public cloud using ciphertext-policy attribute-based proxy re-encryption with revocation. Int. J. Commun Syst 31(5), 1–28 (2018)

    Article  Google Scholar 

  8. Zhang, L., Cui, Y., Mu, Y.: Improving security and privacy attribute based data sharing in cloud computing. IEEE Syst. J. 14(1), 387–397 (2020)

    Article  Google Scholar 

  9. Qian, X., Tan, C., Fan, Z., Zhu, W., Xiao, Y., Cheng, F.: Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption. IEEE Access 6, 34051–34074 (2018)

    Article  Google Scholar 

  10. Sreenivasa Rao, Y.: A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener. Comput. Syst. 67, 133–151 (2017)

    Article  Google Scholar 

  11. Ying, Z., Wei, L., Li, Q., Liu, X., Cui, J.: A lightweight policy preserving EHR sharing scheme in the cloud. IEEE Access 6, 53698–53708 (2018)

    Article  Google Scholar 

  12. Huang, L., Zhang, G., Yu, S., Fu, A., Yearwood, J.: SeShare: secure cloud data sharing based on blockchain and public auditing. Concurr. Comput. Pract. Exp. 31(22), 1–15 (2017)

    Google Scholar 

  13. Velumadhava Rao, R., Selvamani, K., Kanimozhi, S., Kannan, A.: Hierarchical group key management for secure data sharing in a cloud-based environment. Concurr. Comput. Pract. Exp. 31(12), 1–16 (2019)

    Article  Google Scholar 

  14. Vijayakumar, P., Ganesh, S.M., Deborah, L.J., Hafizul Islam, S.K., Hassan, M.M., Alelaiwi, A., Fortino, G.: MGPV: a novel and efficient scheme for secure data sharing among mobile users in the public cloud. Future Gener. Comput. Syst. 95, 560–569 (2019)

    Article  Google Scholar 

  15. Narayanan, U., Paul, V., Joseph, S.: A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. J. King Saud Univ. Comput. Inf. Sci. (2020). https://doi.org/10.1016/j.jksuci.2020.05.005

    Article  Google Scholar 

  16. Wei, J., Hu, X., Liu, W., Zhang, Q.: Forward and backward secure fuzzy encryption for data sharing in cloud computing. Soft. Comput. 23, 497–506 (2019)

    Article  Google Scholar 

  17. Pradeep, K.V., Vijayakumar, V., Subramaniyaswamy, V.: An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment. J. Comput. Netw. Commun. 2019, 1–8 (2019)

    Article  Google Scholar 

  18. Nishoni, S., Tenis, A.: Secure communication with data analysis and auditing using bilinear key aggregate cryptosystem in cloud computing. Mater. Today: Proc. 24, 2358–2365 (2020)

    Google Scholar 

  19. Xue, Y., Xue, K., Gai, N., Hong, J., Wei, D.S., Hong, P.: An attribute-based controlled collaborative access control scheme for public cloud storage. IEEE Trans. Inf. Forensics Secur. 14(11), 2927–2942 (2019)

    Article  Google Scholar 

  20. Xu, R., Joshi, J., Krishnamurthy, P.: An integrated privacy preserving attribute-based access control framework supporting secure deduplication. IEEE Trans. Dependable Secur. Comput. (2019). https://doi.org/10.1109/TDSC.2019.2946073

    Article  Google Scholar 

  21. Raja, R.A., Kousik, N.V.: Privacy preservation between privacy and utility using ECC-based PSO algorithm. In: Intelligent Computing and Applications (pp. 567–573). Springer, Singapore (2021)

  22. Kousik, N.V., Jayasri, S., Daniel, A., Rajakumar, P.: A survey on various load balancing algorithm to improve the task scheduling in cloud computing environment. J. Adv. Res. Dyn. Control Syst. 11(08), 2397–2406 (2019)

    Google Scholar 

  23. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  24. Raja R.A., Karthikeyan, T., Kousik, N.V.: 11 Improved Privacy Preservation Framework for Cloud-Based Internet of Things. Internet of Things: Integration and Security Challenges, p. 165 (2020)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Mala.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mala, J., Jayanthi, A.N. Deep multilayer percepted policy attribute Lamport certificateless signcryption for secure data access and sharing in cloud. Distrib Parallel Databases 40, 67–84 (2022). https://doi.org/10.1007/s10619-021-07336-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10619-021-07336-z

Keywords

Navigation