CP-ABE Based Data Sharing Scheme Supporting Separating Read/Write Permissions

被引:0
作者
Hu A.-T. [1 ]
Hu A.-Q. [1 ]
机构
[1] School of Cyberspace Security, Southeast University, Nanjing, 210096, Jiangsu
来源
Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology | 2019年 / 39卷 / 07期
关键词
Attribute-based encryption; Cloud computing; Cloud storage security; Data sharing;
D O I
10.15918/j.tbit1001-0645.2019.07.010
中图分类号
学科分类号
摘要
In order to solve complex algorithm, huge communication overheads, and security loopholes for CP-ABE-based data sharing scheme problem, a decentralized data sharing system was proposed to custom read and write permissions. The CP-ABE (ciphertext policy-attribute based encryption) algorithm was combined with BLS signature algorithm for the data owner to define read or write strategy of users freely and bind the strategy with ciphertexts, making the matched user decrypt the ciphertexts personally. Experiment results show that, the data sharing scheme can outperform another in computation and communication overheads, number of system parameters, signatures length, and security level. © 2019, Editorial Department of Transaction of Beijing Institute of Technology. All right reserved.
引用
收藏
页码:719 / 724
页数:5
相关论文
共 15 条
[1]  
Sahai A., Waters B., Fuzzy identity-based encryption, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457-473, (2005)
[2]  
Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
[3]  
Li Y., Lei L., A multi-authorities access control scheme supporting revocation, Transactions of Beijing Institute of Technology, 37, 10, pp. 1014-1018, (2017)
[4]  
Lewko A., Waters B., New techniques for dual system encryption and fully secure HIBE with short ciphertexts, 7 Th Theory of Cryptography Conference, pp. 455-479, (2010)
[5]  
Sushmita R., Milos S., Amiya N., Decentralized access control with anonymous authentication of data stored in clouds, IEEE Transaction on Parallel and Distributed Systems, 25, 2, pp. 384-394, (2014)
[6]  
Yu S., Wang C., Ren K., Et al., Attribute based data sharing with attribute revocation, Proceedings of the 5 Th ACM Symposium on Information, pp. 261-270, (2010)
[7]  
Hur J., Noh D.K., Attribute-based access control with efficient revocation in data outsourcing systems, IEEE Transactions on Parallel and Distributed Systems, 22, 7, pp. 1214-1221, (2011)
[8]  
Yang K., Jia X., Expressive, efficient, and revocable data access control for multi-authority cloud storage, IEEE Transactions on Parallel and Distributed Systems, 25, 7, pp. 1735-1744, (2014)
[9]  
Yu S., Ren K., Lou W., Attribute-based content distribution with hidden policy, Secure Network Protocols, pp. 39-44, (2008)
[10]  
Lewko A., Okamoto T., Sahai A., Et al., Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 62-91, (2010)