An improved attribute-based encryption technique towards the data security in cloud computing

被引:77
作者
Namasudra, Suyel [1 ]
机构
[1] Galgotias Univ, Sch Engn & Comp Sci, Plot 2,Sect 17-A,Yamuna Expressway, Greater Noida 201310, Uttar Pradesh, India
关键词
attribute-based encryption; cloud computing; cloud service provider; data owner; distributed hash table network; identity-based timed-release encryption; PEER-TO-PEER; ACCESS-CONTROL; PROTOCOL; OVERLAY;
D O I
10.1002/cpe.4364
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the rapid development of the Internet, resource and knowledge sharing are two major problems experienced due to the presence of many hackers and malicious users. In this paper, an efficient and secure access control model has been proposed for the cloud computing environment for resource and knowledge sharing by using attribute-based encryption (ABE), distributed hash table (DHT) network, and identity-based timed-release encryption (IDTRE). Here, at first, data or resources are encrypted by using the attributes of users, and encrypted data are divided into the encapsulated ciphertext and extracted ciphertext. Then, IDTRE algorithm has been used to encrypt the decryption key and combined the ciphertext of the key with the extracted ciphertext for creating the ciphertext shares. At last, the ciphertext shares are distributed into the DHT network, and encapsulated ciphertext are stored on the cloud servers. Both the performance and security analysis show the proficiency of the proposed scheme over the existing schemes in a cloud environment.
引用
收藏
页数:15
相关论文
共 45 条
[1]  
[Anonymous], KNOWLEDGE GRID
[2]  
[Anonymous], J CONVERGENCE
[3]  
[Anonymous], 2017, 2017 INT C INN INF
[4]  
[Anonymous], PEER TO PEER NETWORK
[5]  
[Anonymous], 2017, P 2 INT C REC TRENDS
[6]  
[Anonymous], 2017, J ORG END USER COMP
[7]  
[Anonymous], 1996, TECHNICAL REPORT
[8]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[9]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[10]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535