τ-Access Policy: Attribute-Based Encryption Scheme for Social Network Based Data Trading

被引:0
|
作者
Shamsher Ullah [1 ,2 ]
Lan Zhang [2 ]
Muhammad Wasif Sardar [2 ,3 ]
Muhammad Tanveer Hussain [4 ]
机构
[1] School of Software, Northwestern Polytechnical University
[2] School of Science, Department of Mathematics, University of Management and Technology
[3] Department of Electronics and Electrical Systems, University of Lahore
[4] School of Computer Science and Technology University of Science and Technology of China
关键词
D O I
暂无
中图分类号
TP309.7 [加密与解密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
The rapid development of social technology has replaced physical interaction in the trading market. The implication of this technology is to provide access to the right information at the right time.The drawback of these technologies is that the eavesdropper can remove the user from the network and can create proxy participants. In this paper, we discuss how a social network overcome and prevent these data trading issues. To maintain the security of data trading,we applied ABE technique based on DBDH to secure data trading network. Our proposed τ-access policy scheme provides the best solution for the betterment of data trading network in terms of security.In τ-access policy scheme, the users can encrypt and decrypt Private Transactions Information(PTI) using our proposed τ-access policy. The security properties of τ-access policy are data confidentiality, data integrity, authenticity, non-repudiation, and unforgeability. The efficiency of our scheme is 77.73%, which is more suitable for data trading markets and trading strategies.
引用
收藏
页码:183 / 198
页数:16
相关论文
共 50 条
  • [31] An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors
    Ruizhong Du
    Ailun Tan
    Junfeng Tian
    TsinghuaScienceandTechnology, 2020, 25 (05) : 579 - 588
  • [32] An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors
    Du, Ruizhong
    Tan, Ailun
    Tian, Junfeng
    TSINGHUA SCIENCE AND TECHNOLOGY, 2020, 25 (05) : 579 - 588
  • [33] Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment
    Yan, Liang
    Ge, Lina
    Wang, Zhe
    Zhang, Guifen
    Xu, Jingya
    Hu, Zheng
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [34] Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment
    Liang Yan
    Lina Ge
    Zhe Wang
    Guifen Zhang
    Jingya Xu
    Zheng Hu
    Journal of Cloud Computing, 12
  • [35] Software Implementation of an Attribute-Based Encryption Scheme
    Zavattoni, Eric
    Dominguez Perez, Luis J.
    Mitsunari, Shigeo
    Sanchez-Ramirez, Ana H.
    Teruya, Tadanori
    Rodriguez-Henriquez, Francisco
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (05) : 1429 - 1441
  • [36] Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
    Li, Yang
    Qi, Baoyue
    Wang, Mengmeng
    Zhu, Jianming
    Wang, Xiuli
    DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 105 - 124
  • [37] Improvement of an outsourced attribute-based encryption scheme
    Chen, Hongjie
    Liao, Yongjian
    SOFT COMPUTING, 2019, 23 (22) : 11409 - 11417
  • [38] Efficient revocable attribute-based encryption scheme
    Li X.
    Zhang D.
    Li H.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 32 - 39
  • [39] Improvement of an outsourced attribute-based encryption scheme
    Hongjie Chen
    Yongjian Liao
    Soft Computing, 2019, 23 : 11409 - 11417
  • [40] Attribute-based encryption with Hidden access structures
    Wang, Hai-Bin
    Chen, Shao-Zhen
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012, 34 (02): : 457 - 461