τ-Access Policy: Attribute-Based Encryption Scheme for Social Network Based Data Trading

被引:0
|
作者
Shamsher Ullah [1 ,2 ]
Lan Zhang [2 ]
Muhammad Wasif Sardar [2 ,3 ]
Muhammad Tanveer Hussain [4 ]
机构
[1] School of Software, Northwestern Polytechnical University
[2] School of Science, Department of Mathematics, University of Management and Technology
[3] Department of Electronics and Electrical Systems, University of Lahore
[4] School of Computer Science and Technology University of Science and Technology of China
关键词
D O I
暂无
中图分类号
TP309.7 [加密与解密];
学科分类号
摘要
The rapid development of social technology has replaced physical interaction in the trading market. The implication of this technology is to provide access to the right information at the right time.The drawback of these technologies is that the eavesdropper can remove the user from the network and can create proxy participants. In this paper, we discuss how a social network overcome and prevent these data trading issues. To maintain the security of data trading,we applied ABE technique based on DBDH to secure data trading network. Our proposed τ-access policy scheme provides the best solution for the betterment of data trading network in terms of security.In τ-access policy scheme, the users can encrypt and decrypt Private Transactions Information(PTI) using our proposed τ-access policy. The security properties of τ-access policy are data confidentiality, data integrity, authenticity, non-repudiation, and unforgeability. The efficiency of our scheme is 77.73%, which is more suitable for data trading markets and trading strategies.
引用
收藏
页码:183 / 198
页数:16
相关论文
共 50 条
  • [1] τ-Access Policy: Attribute-Based Encryption Scheme for Social Network Based Data Trading
    Ullah, Shamsher
    Zhang, Lan
    Sardar, Muhammad Wasif
    Hussain, Muhammad Tanveer
    CHINA COMMUNICATIONS, 2021, 18 (08) : 183 - 198
  • [2] Complex and flexible data access policy in attribute-based encryption
    Hu, Shengzhou
    Wang, Xingfu
    He, Hua
    Zhong, Tingting
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (01): : 1010 - 1029
  • [3] Complex and flexible data access policy in attribute-based encryption
    Shengzhou Hu
    Xingfu Wang
    Hua He
    Tingting Zhong
    The Journal of Supercomputing, 2022, 78 : 1010 - 1029
  • [4] Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption
    Yang, Xiaodong
    Chen, Aijia
    Wang, Zhisong
    Li, Shudong
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [5] Attribute-based Encryption Scheme with Fast Encryption
    一种支持快速加密的基于属性加密方案
    Feng, Chao-Sheng (csfenggy@126.com), 1600, Chinese Academy of Sciences (31): : 3923 - 3936
  • [6] A Multi-authority Attribute-Based Encryption Access Control for Social Network
    Yang, Xiao-dong
    Yang, Miao-miao
    Yang, Ping
    Leng, Qi
    CONFERENCE PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING (ICCSSE), 2017, : 671 - 674
  • [7] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme
    Zheng, Hua
    Zhang, Xi
    Yang, Qi
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 400 - 411
  • [8] Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
    Asim, Muhammad
    Ibraimi, Luan
    Petkovic, Milan
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 244 - +
  • [9] Attribute-Based Encryption Scheme Based on SIFF
    Zhao, Tianyu
    Wei, Lingbo
    Zhang, Chi
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [10] Efficient key-policy attribute-based encryption scheme
    Xu, Zhiqin
    Zhang, Leyou
    ICIC Express Letters, 2015, 9 (01): : 31 - 35