Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment

被引:0
作者
Nayudu P.P. [1 ]
Sekhar K.R. [1 ]
机构
[1] Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, AP, Vaddeswaram
来源
Computer Systems Science and Engineering | 2023年 / 46卷 / 01期
关键词
access policy; attribute; ciphertext; Cloud computing; CP-ABE; decryption; encryption; hash code; SHA-512;
D O I
10.32604/csse.2023.033961
中图分类号
学科分类号
摘要
The cloud allows clients to store and share data. Depending on the user's needs, it is imperative to design an effective access control plan to share the information only with approved users. The user loses control of their data when the data is outsourced to the cloud. Therefore, access control mechanisms will become a significant challenging problem. The Ciphertext-Policy Attribute- Based Encryption (CP-ABE) is an essential solution in which the user can control data access. CP-ABE encrypts the data under a limited access policy after the user sets some access policies. The user can decrypt the data if they satisfy the limited access policy. Although CP-ABE is an effective access control program, the privacy of the policy might be compromised by the attackers. Namely, the attackers can gather important information from plain text policy. To address this issue, the SHA-512 algorithm is presented to create a hash code for the user's attributes in this paper. Depending on the created hash codes, an access policy will be formed. It leads to protecting the access policy against attacks. The effectiveness of the proposed scheme is assessed based on decryption time, private key generation time, ciphertext generation time, and data verification time. © 2023 CRL Publishing. All rights reserved.
引用
收藏
页码:1079 / 1092
页数:13
相关论文
共 19 条
[1]  
Ratten V., Cloud computing technology innovation advances: A set of research propositions, International Journal of Cloud Applications and Computing (IJCAC), 5, 1, pp. 69-76, (2015)
[2]  
Buyya R., Christian V., Selvi S. T., Mastering cloud computing: Foundations and applications programming, (2013)
[3]  
Wu W., Zhang Q., Wang Y., Public cloud security protection research, 2019 IEEE Int. Conf. on Signal Processing, Communications and Computing (ICSPCC), pp. 1-4, (2019)
[4]  
Kallahalla M., Riedel E., Swaminathan R., Wang Q., Fu K., Plutus: Scalable secure file sharing on untrusted storage, 2nd USENIX Conf. on File and Storage Technologies (FAST 03), pp. 29-42, (2003)
[5]  
Anderson R., Security Engineering: A Guide to Building Dependable Distributed Systems, (2020)
[6]  
Bell D. E., Looking back at the bell-la padula model, 21st Annual Computer Security Applications Conf. (ACSAC'05), (2005)
[7]  
Wang G., Liu Q., Wu J., Achieving fine-grained access control for secure data sharing on cloud servers, Concurrency and Computation: Practice and Experience, 23, 12, pp. 1443-1464, (2011)
[8]  
Zhu H., Wang L., Ahmad H., Niu X., Key-policy attribute-based encryption with equality test in cloud computing, IEEE Access, 5, pp. 20428-20439, (2017)
[9]  
Huang X., Susilo W., Mu Y., Zhang F., Short designated verifier signature scheme and its identity-based variant, 6, 1, pp. 82-93, (2008)
[10]  
Sahai A., Waters B., Fuzzy identity-based encryption, Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, pp. 457-473, (2005)