An Efficient and Secure Access Authorization Policy for Cloud Storage Resources Based on Fuzzy Searchable Encryption

被引:0
作者
Fu, Jun [1 ]
机构
[1] Guangdong Open Univ, Guangzhou 510091, Peoples R China
关键词
Fuzzy search encryption; cloud storage; security access; CP-ABE (Ciphertext-Policy Attribute-Based Encryption); access control; authorization policy; SCHEME; AUTHENTICATION;
D O I
10.14569/IJACSA.2024.0150735
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
When fuzzy searchable encrypted cloud storage resources are available, keywords are allowed to have a certain range of changes. Even if there are slight differences in the spelling, word order, or spacing between words, the correct data can be matched. Therefore, it does not have the effect of finegrained access control (FGAC). Consequently, to satisfy the security demands of cloud storage assets and the ease of resource retrieval through fuzzy searchable encryption, CP-ABE employs attribute and policy definitions to introduce a novel, effective security access authorization approach for cloud storage assets utilizing fuzzy searchable encryption technology. Encrypt cloud storage resources after keyword preprocessing through initialization, file encryption and decryption, index generation encryption, search, and other steps; use the wildcard-based method to generate indexes; and use the Bloom filter to generate security traps to achieve Pail lier-based asymmetric fuzzy searchable encryption of resources. In combination with the CPABE-based access control method, authorized users are assigned private keys in the authorization center to ensure that unauthorized users cannot obtain cloud storage resources and complete the fuzzy searchable encryption access authorization of cloud storage resources. The experiment shows that the search index generation of this strategy greatly reduces the resource utilization rate and effectively improves the fuzzy search speed. Moreover, the combination of fuzzy searchable encryption and CP-ABE can better ensure full cloud storage resources.
引用
收藏
页码:356 / 366
页数:11
相关论文
共 20 条
[1]   Distributed access control for information-centric networking architectures using verifiable credentials [J].
Alzahrani, Bander ;
Fotiou, Nikos ;
Albeshri, Aiiad ;
Almuhaimeed, Abdullah ;
Alsubhi, Khalid .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (02) :467-478
[2]   Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT [J].
Banerjee, Soumya ;
Bera, Basudeb ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Khan, Muhammad Khurram ;
Rodrigues, Joel J. P. C. .
COMPUTER COMMUNICATIONS, 2021, 169 :99-113
[3]   KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption [J].
Chaudhari, Payal ;
Das, Manik Lal .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) :1036-1044
[4]   Privacy-preserving searchable encryption in the intelligent edge computing [J].
Chen, Qi ;
Fan, Kai ;
Zhang, Kuan ;
Wang, Haoyang ;
Li, Hui ;
Yang, Yingtang .
COMPUTER COMMUNICATIONS, 2020, 164 :31-41
[5]   Advanced framework for highly secure and cloud-based storage of colour images [J].
Chidambaram, Nithya ;
Raj, Pethuru ;
Thenmozhi, Karruppuswamy ;
Amirtharajan, Rengarajan .
IET IMAGE PROCESSING, 2020, 14 (13) :3143-3153
[6]   uFETCH: A Unified Searchable Encryption Scheme and Its Saas-Native to Make DBMS Privacy-Preserving [J].
Chung, Shen-Ming ;
Shieh, Ming-Der ;
Chiueh, Tzi-Cker ;
Liu, Chia-Chia ;
Tu, Chia-Heng .
IEEE ACCESS, 2020, 8 :93894-93906
[7]   MACPABE: Multi-Authority-based CP-ABE with efficient attribute revocation for IoT-enabled healthcare infrastructure [J].
Das, Sangjukta ;
Namasudra, Suyel .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2023, 33 (03)
[8]   Privacy-preserving data dissemination scheme based on Searchable Encryption, publish-subscribe model, and edge computing [J].
Huso, Ingrid ;
Sparapano, Daniele ;
Piro, Giuseppe ;
Boggia, Gennaro .
COMPUTER COMMUNICATIONS, 2023, 203 :262-275
[9]   Towards SDN-based smart contract solution for IoT access control [J].
Khalid, Mizna ;
Hameed, Sufian ;
Qadir, Abdul ;
Shah, Syed Attique ;
Draheim, Dirk .
COMPUTER COMMUNICATIONS, 2023, 198 :1-31
[10]   KCB-BC-SSE: A Keyword Complete Binary Tree Searchable Symmetric Encryption Scheme using Blockchain [J].
Liu, Xiru ;
Wang, Guijuan ;
Yan, Biwei ;
Yu, Jiguo .
2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 :377-382