Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage

被引:7
作者
Wang, Shangping [1 ]
Gao, Tingting [1 ]
Zhang, Yaling [2 ]
机构
[1] Xian Univ Technol, Sch Sci, Xian, Shaanxi, Peoples R China
[2] Xian Univ Technol, Sch Comp Sci & Engn, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
ACCESS-CONTROL; REVOCATION;
D O I
10.1371/journal.pone.0206126
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the development of outsourcing data services, data security has become an urgent problem that needs to be solved. Attribute-based encryption is a valid solution to data security in cloud storage. There is no existing scheme that can guarantee the privacy of access structures and achieve attribute-based encryption with keyword search and attribute revocation. In this article, we propose a new searchable and revocable multi-data owner attribute-based encryption scheme with a hidden policy in cloud storage. In the new scheme, the same access policy is used in both the keyword index and message encryption. The advantage of keyword index with access policy is that as long as a user's attributes satisfy the access policy, the searched ciphertext can be correctly decrypted. This property improves the accuracy of the search results. The hidden policy is used in both the ciphertext and the keyword index to protect users' privacy. The new scheme contains attribute revocation, which is suitable for the actual situation that a user's attributes maybe changed over time. In the general bilinear group model, the security of the scheme is demonstrated, and the efficiency of the scheme is analyzed.
引用
收藏
页数:19
相关论文
共 50 条
[41]   Fine-Grained Access Control for Cloud Data Sharing by Secure and Efficient Attribute-Revocable Ciphertext-Policy Attribute-Based Encryption [J].
Vaanchig, Nyamsuren ;
Chen, Wei ;
Qin, Zhiguang .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (10) :303-319
[42]   The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing [J].
Michalas, Antonis .
SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, :146-155
[43]   Traceable and Weighted Attribute-Based Encryption Scheme in the Cloud Environment [J].
Yan, Xixi ;
Yuan, Xiaohan ;
Zhang, Qichao ;
Tang, Yongli .
IEEE ACCESS, 2020, 8 :38285-38295
[44]   RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage [J].
Zhao, Siyu ;
Jiang, Rui ;
Bhargava, Bharat .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) :1026-1035
[45]   Protecting data in cloud environment with attribute-based encryption [J].
Zhu, Shuaishuai ;
Yang, Xiaoyuan .
INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (02) :91-97
[46]   Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things [J].
Xiong, Hu ;
Huang, Xin ;
Yang, Minghao ;
Wang, Lili ;
Yu, Shui .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) :3097-3111
[47]   Multi-authority attribute-based encryption access control model for cloud storage [J].
Guan, Zhi-Tao ;
Yang, Ting-Ting ;
Xu, Ru-Zhi ;
Wang, Zhu-Xiao .
Tongxin Xuebao/Journal on Communications, 2015, 36 (06)
[48]   An Improved Ciphertext-Policy Attribute-Based Encryption Scheme [J].
Zheng, Hua ;
Zhang, Xi ;
Yang, Qi .
SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 :400-411
[49]   Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme [J].
Asim, Muhammad ;
Ibraimi, Luan ;
Petkovic, Milan .
COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 :244-+
[50]   Outsourced ciphertext-policy attribute-based encryption with partial policy hidden [J].
Yu, Jinxia ;
He, Guanghui ;
Yan, Xixi ;
Tang, Yongli ;
Qin, Rongxia .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)