A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds

International Journal of Emerging Research in Science, Engineering, and Management
Vol. 2, Issue 1, pp. 248-254, January 2026.

https://doi.org/10.58482/ijersem.v2i1.34

Chavva Ujwala Sravanthi

Mannaru Prem Kumar

Aluru Vivek Krishna

Mallela Thanisha Jasmine Raj

Arshad Gaddi

D. Janani

Department of CSE, Siddartha Institute of Science and Technology, Puttur, India.

Abstract: Cloud computing has been rapidly embraced in the healthcare industry, which has made it possible to store and share the processed Electronic Medical Records in large volumes. Nevertheless, due to the property of third-party cloud servers to store sensitive medical data, this installation may result in significant threats of security as per the data privacy, fine- grained access control, and trust. Even though the Attribute- Based Encryption (ABE) has the advantage of providing potent access-control capabilities, it does not have effective secure data-delegation measures. Attribute-based Proxy Re-encryption (ABPRE) can address this weakness by giving cloud providers the ability to re-encrypt ciphertexts on behalf of legitimate secondary reimbursees. However, the current ABPRE schemes have two significant weaknesses: verifiability, since users are not able to determine that the cloud has performed the transformation of the data appropriately, and fairness, since the cloud servers cannot prove their goodwill in the face of malicious claims by the users. This paper thus presents and compares a new scheme of Verifiable and Fair Attribute-based Proxy Re-Encryption (VF- ABPRE). The cryptographic architecture is a hybrid approach that leverage the power of computational capabilities of AES to provide efficient encapsulation of data as well as leverage the use of VF-ABPRE to provide a finer level of security on key encapsulation. A fairness system was integrated, which is based on cryptographic commitments, so that as a user and a cloud provider and can resolve a conflict in a mathematically provable way. The application is developed in Python and Flask and performance measurement proves that the system can be used as a practical implementation in the area of medical data sharing.

Keywords: Cloud Computing, Medical Data Security, Attribute-Based Proxy Re-Encryption, Access Control, Hybrid Encryption.

References: 

  1. L. Sun, C. Xu, and F. Zeng, “Verifiable and hybrid attribute-based proxy re-encryption for flexible data sharing in cloud storage,” Journal of Parallel and Distributed Computing, vol. 193, p. 104956, Jul. 2024, doi: 10.1016/j.jpdc.2024.104956.
  2.  Xie, R.-H. Shi, X. Zhang, P. Wang, and W. Guo, “Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments,” Journal of Information Security and Applications, vol. 76, p. 103526, Jun. 2023, doi: 10.1016/j.jisa.2023.103526.
  3. X. Liu, H. Wang, B. Zhang, Y. Zhang, and B. Zhang, “Secure medical data sharing with verifiable outsourced decryption and cryptographic reverse firewalls,” Journal of Information Security and Applications, vol. 90, p. 104050, Apr. 2025, doi: 10.1016/j.jisa.2025.104050.
  4. P. Duan et al., “Secure collaborative EHR Sharing using multi-authority attribute-based proxy re-encryption in Web 3.0,” Computer Networks, vol. 255, p. 110851, Oct. 2024, doi: 10.1016/j.comnet.2024.110851.
  5. H. Zhou, L. Deng, Y. Wu, and S. Zhou, “A pairing-free proxy re-encryption scheme suitable for cloud medical information systems,” Journal of Information Security and Applications, vol. 89, p. 103967, Jan. 2025, doi: 10.1016/j.jisa.2025.103967.
  6. R. Priyadarshini, K. R. Geethika, V. Sravya, K. Pujitha, C. Prakash, and A. Kumar, “Password-Protected, Quantum-Resilient data offloading for cloud platforms,” International Journal of Emerging Research in Science, Engineering, and Management, vol. 2, issue 1, pp. 169-74, Jan. 2026, doi: 10.58482/ijersem.v2i1.23.
  7. G. Ravi Kumar and C. Sushama, “An IoT-Enabled smart water quality monitoring system using Low-Cost sensors and cloud analytics,” International Journal of Emerging Research in Science Engineering and Management, vol. 1, no. 5, pp. 7–12, Nov. 2025, doi: 10.58482/ijersem.v1i5.2.
  8. J. Lai, R. H. Deng, C. Guan and J. Weng, “Attribute-Based Encryption With Verifiable Outsourced Decryption,” in IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013, doi: 10.1109/TIFS.2013.2271848.
  9. H. Ma, R. Zhang, Z. Wan, Y. Lu and S. Lin, “Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing,” in IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 6, pp. 679-692, 1 Nov.-Dec. 2017, doi: 10.1109/TDSC.2015.2499755.
  10. J. Bethencourt, A. Sahai and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” 2007 IEEE Symposium on Security and Privacy (SP ’07), Berkeley, CA, USA, 2007, pp. 321-334, doi: 10.1109/SP.2007.11.
  11. H. Cheng, S.-L. Lo, and J. Lu, “A blockchain-enabled decentralized access control scheme using multi-authority attribute-based encryption for edge-assisted Internet of Things,” Internet of Things, vol. 26, p. 101220, May 2024, doi: 10.1016/j.iot.2024.101220.
  12. T. M. S. Mekalarani, V. S. Pavan, S. Radhika, A. Rekha, and Y. Thimmaraju, “MLOPs-Based Cloud Deployment Pipeline for scalable ML workloads,” International Journal of Emerging Research in Science, Engineering, and Management, vol. 2, Issue 1, pp. 117-124, Jan. 2026, doi: 10.58482/ijersem.v2i1.17.
  •