A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing

被引:10
|
作者
Fu, Junsong [1 ]
Wang, Na [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
基金
中国博士后科学基金;
关键词
Cloud computing; attribute-based document collection encryption; encryption/decryption efficiency; information security; KEYWORD SEARCH; SECURE;
D O I
10.1109/ACCESS.2019.2905346
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption can provide fine-grained access control and secure data sharing to the data users in cloud computing. However, the encryption/decryption efficiency of existing schemes can be further improved when encrypting a large document collection. In this paper, we propose a practical Ciphertext-Policy Attribute-Based Hierarchical document collection Encryption scheme named CP-ABHE. By practical, we mean that CP-ABHE is more efficient in both computation and storage space without sacrificing data security. In CP-ABHE, we first construct a set of integrated access trees based on the documents' attribute sets. We employ the greedy strategy to build the trees incrementally and grow the trees dynamically by combining the small ones. Then, all the documents on an integrated access tree are encrypted together. Different to existing schemes, the leaves in different access trees with the same attribute share the same secret number, which is employed to encrypt the documents. This greatly improves the performance of CP-ABHE. The security of our scheme is theoretically proved based on the decisional bilinear Diffie-Hellman assumption. The simulation results illustrate that CP-ABHE performs very well in terms of security, efficiency, and the storage size of the ciphertext.
引用
收藏
页码:36218 / 36232
页数:15
相关论文
共 50 条
  • [21] A practical construction for large universe hierarchical attribute-based encryption
    Li, Cong
    Fang, Yuejian
    Zhang, Xing
    Jin, Cancan
    Shen, Qingni
    Wu, Zhonghai
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (17):
  • [22] An Attribute-Based Assured Deletion Scheme in Cloud Computing
    Shan, Fangfang
    Li, Hui
    Li, Fenghua
    Guo, Yunchuan
    Xiong, Jinbo
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2019, 14 (02) : 74 - 91
  • [23] Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption
    Zhu, Shuaishuai
    Han, Yiliang
    Wei, Yuechuan
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 257 - 261
  • [24] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    ACM COMPUTING SURVEYS, 2020, 53 (04)
  • [25] Traceable and Weighted Attribute-Based Encryption Scheme in the Cloud Environment
    Yan, Xixi
    Yuan, Xiaohan
    Zhang, Qichao
    Tang, Yongli
    IEEE ACCESS, 2020, 8 : 38285 - 38295
  • [26] Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing
    Chen, Yang
    Li, Wenmin
    Gao, Fei
    Wen, Qiaoyan
    Zhang, Hua
    Wang, Huawei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) : 724 - 735
  • [27] A keyword searchable attribute-based encryption scheme with attribute update for cloud storage
    Wang, Shangping
    Ye, Jian
    Zhang, Yaling
    PLOS ONE, 2018, 13 (05):
  • [28] Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
    Sun L.
    Zhao Z.
    Wang J.
    Zhu Z.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 47 - 56
  • [29] Attribute-based Encryption Scheme with Fast Encryption
    一种支持快速加密的基于属性加密方案
    Feng, Chao-Sheng (csfenggy@126.com), 1600, Chinese Academy of Sciences (31): : 3923 - 3936
  • [30] New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing
    Zhang, Leyou
    Hu, Yupu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (05): : 1343 - 1356