I. Introduction
Cloud computing offers economic savings and flexible usage [1], providing users with universal and efficient network access. Instead of purchasing lots of equipment to store and manage data, both individuals and enterprises are motivated to outsource their data to the cloud. However, the hidden security issues prompt cloud users to encrypt the data before outsourcing [2]. With the increasing network attacks, secure data sharing in multiowner scenarios still remains a significant challenge.