Efficient Escrow-free CP-ABE with Constant Size Ciphertext and Secret Key for Big Data Storage in Cloud

被引:29
作者
Premkamal, Praveen Kumar [1 ]
Pasupuleti, Syam Kumar [2 ]
Alphonse, P. J. A. [1 ]
机构
[1] Natl Inst Technol Tiruchirappalli, Tiruchirappalli, Tamil Nadu, India
[2] Inst Dev & Res Banking Technol, Hyderabad, India
关键词
Access Control; Big Data; Cloud Computing; Constant Size Ciphertext And Secret Key; CP-ABE; Key Escrow; Privacy; ATTRIBUTE-BASED ENCRYPTION; PRIVACY; DECRYPTION; THRESHOLD; SECURITY;
D O I
10.4018/IJCAC.2020010103
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) schemes are an appropriate cryptographic technique to enable privacy along with access control in the cloud, but the existing CP-ABE schemes do not directly apply for big data because they have the issue of long ciphertext and long secret key size (LC-LS). To address LC-LS, the constant size ciphertext and secret key (CSC-S) schemes proposed. However, the existing CSC-S schemes suffer from the key escrow security issue and efficiency issue. To address both simultaneously, the authors propose an efficient escrow-free CP-ABE with constant size ciphertext and secret key (EEF-CPABE) for big data storage in the Cloud. The EEF-CPABE scheme reduces the encryption and decryption computation overhead by designing CSC-S. Further, the data owner generates the decryption global key to decrypt the data along with user secret key which solves the key escrow issue. Security and performance analysis demonstrate that the EEF-CPABE scheme resists against authority, and chosen plain-text attacks and more efficient than CSC-S schemes.
引用
收藏
页码:28 / 45
页数:18
相关论文
共 27 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]  
[Anonymous], HDB RES MODERN CRYPT
[3]   Attribute-based encryption schemes with constant-size ciphertexts [J].
Attrapadung, Nuttapong ;
Herranz, Javier ;
Laguillaumie, Fabien ;
Libert, Benoit ;
de Panafieu, Elie ;
Rafols, Carla .
THEORETICAL COMPUTER SCIENCE, 2012, 422 :15-38
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]   Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts [J].
Deng, Hua ;
Wu, Qianhong ;
Qin, Bo ;
Domingo-Ferrer, Josep ;
Zhang, Lei ;
Liu, Jianwei ;
Shi, Wenchang .
INFORMATION SCIENCES, 2014, 275 :370-384
[6]   Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption [J].
Doshi, Nishant ;
Jinwala, Devesh C. .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) :1988-2002
[7]  
Emura Keita, 2010, International Journal of Applied Cryptography, V2, P46, DOI 10.1504/IJACT.2010.033798
[8]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[9]   Creating Strategic Business Value from Big Data Analytics: A Research Framework [J].
Grover, Varun ;
Chiang, Roger H. L. ;
Liang, Ting-Peng ;
Zhang, Dongsong .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2018, 35 (02) :388-423
[10]   CP-ABE With Constant-Size Keys for Lightweight Devices [J].
Guo, Fuchun ;
Mu, Yi ;
Susilo, Willy ;
Wong, Duncan S. ;
Varadharajan, Vijay .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) :763-771