A study on data sharing system using ACP-ABE-SE in a cloud environment

被引:3
作者
Hwang, Yong-Woon [1 ]
Lee, Im-Yeong [1 ]
机构
[1] Soonchunhyang Univ, Dept Comp Sci & Engn, Asan, South Korea
基金
新加坡国家研究基金会;
关键词
cloud security; CP-ABE; anonymous; searchable encryption; attribute-based encryption; ABE; ATTRIBUTE-BASED ENCRYPTION;
D O I
10.1504/IJWGS.2021.116535
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing, users can store data externally and share it with other users. However, since various security threats exist in a network environment connected to an external cloud, security technology is required. CP-ABE provides data encryption, decryption, and access control. However, in the existing CP-ABE method, third parties may violate the privacy of users by inferring the attributes of users accessing data with the access structure contained in the ciphertext. In addition, the cloud server cannot guarantee the confidentiality of the data because it decrypts the encrypted text requested by the user and identifies and delivers the data. In this paper, we proposed a new ACP-ABE-SE data sharing system that combines anonymous CP-ABE and searchable encryption, solving user privacy and data confidentiality issues. Therefore, it can be used in an environment where data can be shared safely and efficiently in a cloud environment.
引用
收藏
页码:201 / 220
页数:20
相关论文
共 27 条
  • [1] [Anonymous], 2012, S PHOT OPT, DOI DOI 10.1109/SOPO.2012.6270923
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] Changhee H., 2016, MOB INF SYST, V2016, P1
  • [4] Changhee Hahn, 2016, Journal of KIISE, V43, P933, DOI 10.5626/JOK.2016.43.8.933
  • [5] Emura K, 2009, LECT NOTES COMPUT SC, V5451, P13, DOI 10.1007/978-3-642-00843-6_2
  • [6] Goh Eu-Jin, 2003, Secure indexes IACR Cryptology ePrint Archive
  • [7] Hang S., 2016, 2 IEEE INT C COMP CO 2 IEEE INT C COMP CO
  • [8] CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy
    Helil, Nurmamat
    Rahman, Kaysar
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [9] Huang CY, 2017, PR IEEE I C PROGR IN, P266, DOI 10.1109/PIC.2017.8359555
  • [10] Jie C, 2018, INFORM SCIENCES, V423, P1