Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment

被引:0
|
作者
Nayudu P.P. [1 ]
Sekhar K.R. [1 ]
机构
[1] Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, AP, Vaddeswaram
来源
Computer Systems Science and Engineering | 2023年 / 46卷 / 01期
关键词
access policy; attribute; ciphertext; Cloud computing; CP-ABE; decryption; encryption; hash code; SHA-512;
D O I
10.32604/csse.2023.033961
中图分类号
学科分类号
摘要
The cloud allows clients to store and share data. Depending on the user's needs, it is imperative to design an effective access control plan to share the information only with approved users. The user loses control of their data when the data is outsourced to the cloud. Therefore, access control mechanisms will become a significant challenging problem. The Ciphertext-Policy Attribute- Based Encryption (CP-ABE) is an essential solution in which the user can control data access. CP-ABE encrypts the data under a limited access policy after the user sets some access policies. The user can decrypt the data if they satisfy the limited access policy. Although CP-ABE is an effective access control program, the privacy of the policy might be compromised by the attackers. Namely, the attackers can gather important information from plain text policy. To address this issue, the SHA-512 algorithm is presented to create a hash code for the user's attributes in this paper. Depending on the created hash codes, an access policy will be formed. It leads to protecting the access policy against attacks. The effectiveness of the proposed scheme is assessed based on decryption time, private key generation time, ciphertext generation time, and data verification time. © 2023 CRL Publishing. All rights reserved.
引用
收藏
页码:1079 / 1092
页数:13
相关论文
共 50 条
  • [41] Novel Constructions for Ciphertext-Policy Attribute-Based Searchable Encryption
    Brigitthe Hinojosa-Cabello, Melissa
    Morales-Sandoval, Miguel
    Marin-Castro, Heidy M.
    2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC), 2022,
  • [42] Research on Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage
    Wang, Guangbo
    Wang, Jianhua
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [43] Security analysis for a ciphertext-policy attribute-based encryption scheme
    Zeng, Fugeng
    Xu, Chunxiang
    Zhang, Xinpeng
    Advances in Information Sciences and Service Sciences, 2012, 4 (12): : 201 - 207
  • [44] Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 39 - 60
  • [45] Unified Ciphertext-Policy Weighted Attribute-Based Encryption for Sharing Data in Cloud Computing
    Li, Wei
    Ni, Wei
    Liu, Dongxi
    Liu, Ren Ping
    Luo, Shoushan
    APPLIED SCIENCES-BASEL, 2018, 8 (12):
  • [46] Efficient ciphertext-policy attribute-based encryption with blackbox traceability
    Xu, Shengmin
    Yuan, Jiaming
    Xu, Guowen
    Li, Yingjiu
    Liu, Ximeng
    Zhang, Yinghui
    Ying, Zuobin
    INFORMATION SCIENCES, 2020, 538 : 19 - 38
  • [47] An Efficient Ciphertext-policy Attribute-based Encryption on Ideal Lattices
    Zhao Jian
    Gao Haiying
    Hu Bin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (07) : 1652 - 1660
  • [48] Adaptively secure outsourcing ciphertext-policy attribute-based encryption
    Wang, Hao
    Zheng, Zhihua
    Wu, Lei
    Wang, Yilei
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2270 - 2280
  • [49] New Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Zu, Longhui
    Liu, Zhenhua
    Li, Juanjuan
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 281 - 287
  • [50] Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Li, Yang
    Zhu, Jianming
    Wang, Xiuli
    Chai, Yanmei
    Shao, Shuai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 385 - 394