With the implementation of data sourcing and other cloud services in real time environment, it describes efficient data transmission between different users parallel in distributed environment. Security or privacy is also important factor in data different users data sharing so that efficient and advanced cryptography system is required to do privacy for data from multiple users in cloud computing. Attribute based encryption is one of the basic advanced encryption system to provide efficient privacy between multiple users in distributed environment. Cipher text policy based attributed based encryption (CP-ABE) and Deffie- Hellman is one of the advanced secure approach proposed in this paper to multi user data sharing in distributed environment. In this scenario reduce the computational cost overhead in data sharing and other features in distributed environment. Performance evaluation of proposed approach describes efficient results in terms of encryption, decryption and other specification in cloud computing environment.
Keywords: Attribute based encryption, Cipher text policy based encryption, distributed computing,
[1]. [1] B. Xu et al., "Ubiquitous data accessing method in IoT-based information system for emergency medical services", IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 1578-1586, May 2014
[2]. [2] M. B. Mollah, M. A. K. Azad, A. Vasilakos, "Secure data sharing and searching at the edge of cloud-assisted Internet of Things", IEEE Cloud Comput., vol. 4, no. 1, pp. 34-42, Jan./Feb. 2017
[3]. [3] A. Castiglione, K.-K. R. Choo, M. Nappi, S. Ricciardi, "Context aware ubiquitous biometrics in edge of military things", IEEE Cloud Comput., vol. 4, no. 6, pp. 16-20, Nov./Dec. 2017
[4]. [4] A. Kumari et al., "Multimedia big data computing and Internet of Things applications: A taxonomy and process model", J. Netw. Comput. Appl., vol. 124, pp. 169-195, Dec. 2018.
[5]. [5] S.-H. Seo, M. Nabeel, X. Ding, and E. Bertino, "An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds," IEEE Trans. Knowledge and Data Engineering, vol. 26,
[6]. no. 9, 2014, pp. 2107–2119.