Enabling Access Control for Encrypted Multi-Dimensional Data in Cloud Computing through Range Search

被引:0
作者
Mei, Zhuolin [1 ]
Yu, Jing [1 ]
Huang, Jinzhou [2 ]
Wu, Bin [1 ]
Zhao, Zhiqiang [1 ]
Zhang, Caicai [3 ]
Wu, Zongda [4 ]
机构
[1] Jiujiang Univ, Sch Informat Sci & Technol, 551 Qianjin East Rd, Jiujiang 332005, Jiangxi, Peoples R China
[2] Hubei Univ Arts & Sci, Sch Comp Engn, 296 Longzhong Rd, Xiangyang 441053, Peoples R China
[3] Zhejiang Inst Mech & Elect Engn, Sch Modern Informat Technol, 999 Qingnian Rd, Hangzhou 310000, Zhejiang, Peoples R China
[4] Shaoxing Univ, Sch Math Informat, 508 Huancheng East Rd, Shaoxing 312000, Zhejiang, Peoples R China
来源
TEHNICKI VJESNIK-TECHNICAL GAZETTE | 2023年 / 30卷 / 06期
基金
中国国家自然科学基金;
关键词
access control; bucket embedding; ciphertext policy-attribute based encryption; cloud computing; policy design; range search; QUERIES; PRIVACY; SECURE;
D O I
10.17559/TV-20230415000536
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the growing popularity of cloud computing, data owners are increasingly opting to outsource their data to cloud servers due to the numerous benefits it offers. However, this outsourcing raises concerns about data privacy since the data stored on remote cloud servers is not directly controlled by the owners. Encryption of the data is an effective approach to mitigate these privacy concerns. However, encrypted data lacks distinguishability, leading to limitations in supporting common operations such as range search and access control. In this research paper, we propose a method called RSAC (Range Search Supporting Access Control) for encrypted multi-dimensional data in cloud computing. Our method leverages policy design, bucket embedding, algorithm design, and Ciphertext Policy-Attribute Based Encryption (CPABE) to achieve its objectives. We present extensive experimental results that demonstrate the efficiency of our method and conduct a thorough security analysis to ensure its robustness. Our proposed RSAC method addresses the challenges of range search and access control over encrypted multi-dimensional data, thus contributing to enhancing privacy and security in cloud computing environments.
引用
收藏
页码:1704 / 1716
页数:13
相关论文
共 40 条
  • [1] [Anonymous], 2004, Proceedings of the Thirtieth international conference on Very large data bases-Volume
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] Boldyreva A, 2011, LECT NOTES COMPUT SC, V6841, P578, DOI 10.1007/978-3-642-22792-9_33
  • [4] Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
  • [5] Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
  • [6] Tensor-Based Lyapunov Deep Neural Networks Offloading Control Strategy with Cloud-Fog-Edge Orchestration
    Chen, Yihong
    Yang, Laurence T.
    Cui, Zongmin
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, : 1 - 9
  • [7] Privacy and Accuracy for Cloud-Fog-Edge Collaborative Driver-Vehicle-Road Relation Graphs
    Cui, Zongmin
    Lu, Zhixing
    Yang, Laurence T.
    Yu, Jing
    Chi, Lianhua
    Xiao, Yan
    Zhang, Shunli
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (08) : 8749 - 8761
  • [8] Searchable symmetric encryption: Improved definitions and efficient constructions
    Curtmola, Reza
    Garay, Juan
    Kamara, Seny
    Ostrovsky, Rafail
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) : 895 - 934
  • [9] Daemen J., 1999, AES proposal: Rijndael, DOI [10.1007/springerreference_461, DOI 10.1007/SPRINGERREFERENCE_461]
  • [10] De Caro A, 2011, IEEE SYMP COMP COMMU