Skip to main content

Deep multilayer percepted policy attribute Lamport certificateless signcryption for secure data access and sharing in cloud


Data sharing is a method that allows users to legally access data over the cloud. Cloud computing architecture is used to enable the data sharing capabilities only to the authorized users from the data stored in the cloud server. In the cloud, the number of users is extremely large and the users connect and leave randomly hence that the system needs to protect the data access. Many algorithms have been reviewed but the most challenging issue in cloud computing is a data-sharing system and access policy for an authorized user. A novel technique called Deep Multilayer Percepted Policy Attribute Lamport Certificateless Signcryption (DMPPALCS) is introduced for improving the security level of data access in the cloud with multiple layers. Initially, the users register their details to the cloud server for retrieving the numerous services. After that the cloud server generates the private and public keys for each registered user using Lamport Certificateless Signcryption. After the key generation, the user sends a request to the cloud server for acquiring the data. The cloud server validates that the requested user is authorized or not based on the policy attributes. Then the cloud server facilities the user requested data in the form of ciphertext and generates the signature to the cloud user. Finally, the signature is verified at the user side to decrypt the data. If the signature is valid, then the authorized users obtain the original data and improve secure data access. The proposed DMPPALCS technique is used for evaluating various security parameters.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9


  1. Sethi, K., Pradhan, A., Bera, P.: Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation. J. Inf. Secur. Appl. 51, 1–16 (2020)

    Google Scholar 

  2. Xiong, H., Zhang, H., Sun, J.: Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Syst. J. 13(3), 2739–2750 (2019)

    Article  Google Scholar 

  3. Mythili, R., Venkataraman, R., Sai Raj, T.: An attribute-based lightweight cloud data access control using hypergraph structure. J. Supercomput. 76, 6040–6064 (2020)

    Article  Google Scholar 

  4. Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. J. Syst. Archit. 102, 1–11 (2020)

    Article  Google Scholar 

  5. Rao, K.R., Ra, I.G., Asif, W., Nayak, A., Rajarajan, M.: R-PEKS: RBAC enabled PEKS for secure access of cloud data. IEEE Access 7, 133274–133289 (2019)

    Article  Google Scholar 

  6. Eltayieb, N., Wang, P., Hassan, A., Elhabob, R., Li, F.: ASDS: attribute-based secure data sharing scheme for reliable cloud environment. Secur. Priv. 2(2), 1–11 (2019)

    Google Scholar 

  7. Tiwari, D., Gangadharan, G.R.: SecCloudSharing: secure data sharing in public cloud using ciphertext-policy attribute-based proxy re-encryption with revocation. Int. J. Commun Syst 31(5), 1–28 (2018)

    Article  Google Scholar 

  8. Zhang, L., Cui, Y., Mu, Y.: Improving security and privacy attribute based data sharing in cloud computing. IEEE Syst. J. 14(1), 387–397 (2020)

    Article  Google Scholar 

  9. Qian, X., Tan, C., Fan, Z., Zhu, W., Xiao, Y., Cheng, F.: Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption. IEEE Access 6, 34051–34074 (2018)

    Article  Google Scholar 

  10. Sreenivasa Rao, Y.: A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener. Comput. Syst. 67, 133–151 (2017)

    Article  Google Scholar 

  11. Ying, Z., Wei, L., Li, Q., Liu, X., Cui, J.: A lightweight policy preserving EHR sharing scheme in the cloud. IEEE Access 6, 53698–53708 (2018)

    Article  Google Scholar 

  12. Huang, L., Zhang, G., Yu, S., Fu, A., Yearwood, J.: SeShare: secure cloud data sharing based on blockchain and public auditing. Concurr. Comput. Pract. Exp. 31(22), 1–15 (2017)

    Google Scholar 

  13. Velumadhava Rao, R., Selvamani, K., Kanimozhi, S., Kannan, A.: Hierarchical group key management for secure data sharing in a cloud-based environment. Concurr. Comput. Pract. Exp. 31(12), 1–16 (2019)

    Article  Google Scholar 

  14. Vijayakumar, P., Ganesh, S.M., Deborah, L.J., Hafizul Islam, S.K., Hassan, M.M., Alelaiwi, A., Fortino, G.: MGPV: a novel and efficient scheme for secure data sharing among mobile users in the public cloud. Future Gener. Comput. Syst. 95, 560–569 (2019)

    Article  Google Scholar 

  15. Narayanan, U., Paul, V., Joseph, S.: A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. J. King Saud Univ. Comput. Inf. Sci. (2020).

    Article  Google Scholar 

  16. Wei, J., Hu, X., Liu, W., Zhang, Q.: Forward and backward secure fuzzy encryption for data sharing in cloud computing. Soft. Comput. 23, 497–506 (2019)

    Article  Google Scholar 

  17. Pradeep, K.V., Vijayakumar, V., Subramaniyaswamy, V.: An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment. J. Comput. Netw. Commun. 2019, 1–8 (2019)

    Article  Google Scholar 

  18. Nishoni, S., Tenis, A.: Secure communication with data analysis and auditing using bilinear key aggregate cryptosystem in cloud computing. Mater. Today: Proc. 24, 2358–2365 (2020)

    Google Scholar 

  19. Xue, Y., Xue, K., Gai, N., Hong, J., Wei, D.S., Hong, P.: An attribute-based controlled collaborative access control scheme for public cloud storage. IEEE Trans. Inf. Forensics Secur. 14(11), 2927–2942 (2019)

    Article  Google Scholar 

  20. Xu, R., Joshi, J., Krishnamurthy, P.: An integrated privacy preserving attribute-based access control framework supporting secure deduplication. IEEE Trans. Dependable Secur. Comput. (2019).

    Article  Google Scholar 

  21. Raja, R.A., Kousik, N.V.: Privacy preservation between privacy and utility using ECC-based PSO algorithm. In: Intelligent Computing and Applications (pp. 567–573). Springer, Singapore (2021)

  22. Kousik, N.V., Jayasri, S., Daniel, A., Rajakumar, P.: A survey on various load balancing algorithm to improve the task scheduling in cloud computing environment. J. Adv. Res. Dyn. Control Syst. 11(08), 2397–2406 (2019)

    Google Scholar 

  23. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)

    MathSciNet  Article  Google Scholar 

  24. Raja R.A., Karthikeyan, T., Kousik, N.V.: 11 Improved Privacy Preservation Framework for Cloud-Based Internet of Things. Internet of Things: Integration and Security Challenges, p. 165 (2020)

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to J. Mala.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Mala, J., Jayanthi, A.N. Deep multilayer percepted policy attribute Lamport certificateless signcryption for secure data access and sharing in cloud. Distrib Parallel Databases 40, 67–84 (2022).

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI:


  • Cloud computing
  • Data sharing
  • And access
  • Deep multiplayer perceptron
  • Policy attribute Lamport certificateless signcryption