An Efficient and Secure Access Authorization Policy for Cloud Storage Resources Based on Fuzzy Searchable Encryption

被引:0
作者
Fu, Jun [1 ]
机构
[1] Guangdong Open Univ, Guangzhou 510091, Peoples R China
关键词
Fuzzy search encryption; cloud storage; security access; CP-ABE (Ciphertext-Policy Attribute-Based Encryption); access control; authorization policy; SCHEME; AUTHENTICATION;
D O I
10.14569/IJACSA.2024.0150735
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
When fuzzy searchable encrypted cloud storage resources are available, keywords are allowed to have a certain range of changes. Even if there are slight differences in the spelling, word order, or spacing between words, the correct data can be matched. Therefore, it does not have the effect of finegrained access control (FGAC). Consequently, to satisfy the security demands of cloud storage assets and the ease of resource retrieval through fuzzy searchable encryption, CP-ABE employs attribute and policy definitions to introduce a novel, effective security access authorization approach for cloud storage assets utilizing fuzzy searchable encryption technology. Encrypt cloud storage resources after keyword preprocessing through initialization, file encryption and decryption, index generation encryption, search, and other steps; use the wildcard-based method to generate indexes; and use the Bloom filter to generate security traps to achieve Pail lier-based asymmetric fuzzy searchable encryption of resources. In combination with the CPABE-based access control method, authorized users are assigned private keys in the authorization center to ensure that unauthorized users cannot obtain cloud storage resources and complete the fuzzy searchable encryption access authorization of cloud storage resources. The experiment shows that the search index generation of this strategy greatly reduces the resource utilization rate and effectively improves the fuzzy search speed. Moreover, the combination of fuzzy searchable encryption and CP-ABE can better ensure full cloud storage resources.
引用
收藏
页码:356 / 366
页数:11
相关论文
共 20 条
[11]   Size and layout optimization of truss structures with dynamic constraints using the interactive fuzzy search algorithm [J].
Mortazavi, Ali .
ENGINEERING OPTIMIZATION, 2021, 53 (03) :369-391
[12]   P2KASE A2-privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegation [J].
Padhya, Mukti ;
Jinwala, Devesh C. .
IET INFORMATION SECURITY, 2020, 14 (06) :704-723
[13]   Cluster Based Multi Layer User Authentication Data Center Storage Architecture for Big Data Security in Cloud Computing [J].
Ramasamy, S. ;
Gnanamurthy, R. K. .
JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (01) :159-171
[14]   Restricting data-leakage using fine-grained access control on OSN objects [J].
Rathore, Nemi Chandra ;
Tripathy, Somanath .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (01) :93-106
[15]   FACVO-DNFN: Deep learning-based feature fusion and Distributed Denial of Service attack detection in cloud computing [J].
Selvan, G. S. R. Emil ;
Ganeshan, R. ;
Jingle, I. Diana Jeba ;
Ananth, J. P. .
KNOWLEDGE-BASED SYSTEMS, 2023, 261
[16]   Blockchain-based cloud storage system with CP-ABE-based access control and revocation process [J].
Sharma, Pratima ;
Jindal, Rajni ;
Borah, Malaya Dutta .
JOURNAL OF SUPERCOMPUTING, 2022, 78 (06) :7700-7728
[17]   SUACC-IoT: secure unified authentication and access control system based on capability for IoT [J].
Sivaselvan, N. ;
Bhat, K. Vivekananda ;
Rajarajan, Muttukrishnan ;
Das, Ashok Kumar ;
Rodrigues, Joel J. P. C. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (04) :2409-2428
[18]   A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems [J].
Sowjanya, K. ;
Dasgupta, Mou ;
Ray, Sangram .
JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 117
[19]   An Extended Ultimatum Game for Multi-Party Access Control in Social Networks [J].
Squicciarini, Anna ;
Rajtmajer, Sarah ;
Gao, Yang ;
Semonsen, Justin ;
Belmonte, Andrew ;
Agarwal, Pratik .
ACM TRANSACTIONS ON THE WEB, 2022, 16 (03)
[20]   Server-aided searchable encryption in multi-user setting [J].
Sun, Lixue ;
Xu, Chunxiang ;
Li, Chuang ;
Li, Yuhui .
COMPUTER COMMUNICATIONS, 2020, 164 :25-30