A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing

被引:11
作者
Fu, Junsong [1 ]
Wang, Na [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
基金
中国博士后科学基金;
关键词
Cloud computing; attribute-based document collection encryption; encryption/decryption efficiency; information security; KEYWORD SEARCH; SECURE;
D O I
10.1109/ACCESS.2019.2905346
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption can provide fine-grained access control and secure data sharing to the data users in cloud computing. However, the encryption/decryption efficiency of existing schemes can be further improved when encrypting a large document collection. In this paper, we propose a practical Ciphertext-Policy Attribute-Based Hierarchical document collection Encryption scheme named CP-ABHE. By practical, we mean that CP-ABHE is more efficient in both computation and storage space without sacrificing data security. In CP-ABHE, we first construct a set of integrated access trees based on the documents' attribute sets. We employ the greedy strategy to build the trees incrementally and grow the trees dynamically by combining the small ones. Then, all the documents on an integrated access tree are encrypted together. Different to existing schemes, the leaves in different access trees with the same attribute share the same secret number, which is employed to encrypt the documents. This greatly improves the performance of CP-ABHE. The security of our scheme is theoretically proved based on the decisional bilinear Diffie-Hellman assumption. The simulation results illustrate that CP-ABHE performs very well in terms of security, efficiency, and the storage size of the ciphertext.
引用
收藏
页码:36218 / 36232
页数:15
相关论文
共 50 条
[31]   An improved attribute-based encryption technique towards the data security in cloud computing [J].
Namasudra, Suyel .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (03)
[32]   Server-aided revocable attribute-based encryption for cloud computing services [J].
Cui, Hui ;
Yuen, Tsz Hon ;
Deng, Robert H. ;
Wang, Guilin .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (14)
[33]   Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing [J].
Xia, Zhihua ;
Zhang, Liangao ;
Liu, Dandan .
CHINA COMMUNICATIONS, 2016, 13 (07) :92-99
[34]   Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing [J].
Wang, Hao ;
He, Debiao ;
Shen, Jian ;
Zheng, Zhihua ;
Zhao, Chuan ;
Zhao, Minghao .
SOFT COMPUTING, 2017, 21 (24) :7325-7335
[35]   Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing [J].
Hao Wang ;
Debiao He ;
Jian Shen ;
Zhihua Zheng ;
Chuan Zhao ;
Minghao Zhao .
Soft Computing, 2017, 21 :7325-7335
[36]   Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing [J].
Zhu, Huijun ;
Wang, Licheng ;
Ahmad, Haseeb ;
Niu, Xinxin .
IEEE ACCESS, 2017, 5 :20428-20439
[37]   Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing [J].
Zhihua Xia ;
Liangao Zhang ;
Dandan Liu .
中国通信, 2016, 13 (07) :92-99
[38]   Improvement of an outsourced attribute-based encryption scheme [J].
Chen, Hongjie ;
Liao, Yongjian .
SOFT COMPUTING, 2019, 23 (22) :11409-11417
[39]   Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment [J].
Bera, Sourav ;
Prasad, Suryakant ;
Rao, Y. Sreenivasa ;
Das, Ashok Kumar ;
Park, Youngho .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
[40]   Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things [J].
Ali, Mohammad ;
Sadeghi, Mohammad-Reza ;
Liu, Ximeng .
IEEE ACCESS, 2020, 8 :23951-23964