CR-FH-CPABE: Secure File Hierarchy Attribute-Based Encryption Scheme Supporting User Collusion Resistance in Cloud Computing

被引:0
|
作者
Bai, Yuhan [1 ,2 ]
Fan, Kai [1 ,2 ]
Zhang, Kuan [3 ]
Li, Hui [4 ]
Yang, Yintang [5 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710126, Shaanxi, Peoples R China
[2] Henan Key Lab Network Cryptog Technol, Zhengzhou 450003, Peoples R China
[3] Univ Nebraska Lincoln, Dept Elect & Comp Engn, Lincoln, NE 68588 USA
[4] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[5] Xidian Univ, Key Lab Minist Educ Wide Band Gap Semicond Mat & D, Xian 710071, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 10期
基金
中国国家自然科学基金;
关键词
Attribute-based encryption (ABE); file hierarchy; hierarchical access control; outsourced decryption; user collusion resistance; EFFICIENT;
D O I
10.1109/JIOT.2024.3358745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The attribute-based encryption (ABE) scheme, which can set specific conditions to control user access to data, has been widely studied and applied to cloud storage services. Considering file hierarchy in practical scenarios, the ABE scheme can set a hierarchical access control policy so multiple files can be associated with one access structure to reduce users' computing overhead and save the cloud server's storage space. However, the existing systems have the risk of user collusion due to the hierarchical access control structure parameters. This article proposes a secure file hierarchy ABE scheme supporting user collusion resistance (CR-FH-CPABE) in cloud computing. We add a data noise vector without changing the hierarchical access control structure to prevent user ultra vires. Technically, we break the relationships that colluding users could exploit, prevent malicious users from colluding with their computing results, and extract meaningful information from the ciphertext. In addition, we provide an improved CR-FH-CPABE scheme with outsourced decryption, which helps resource-limited devices obtain computing services. Finally, we demonstrate our scheme is CPA secure and show outstanding performance through simulation results.
引用
收藏
页码:17727 / 17739
页数:13
相关论文
共 50 条
  • [1] An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
    Wang, Shulan
    Zhou, Junwei
    Liu, Joseph K.
    Yu, Jianping
    Chen, Jianyong
    Xie, Weixin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1265 - 1277
  • [2] Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing
    Li, Jiguo
    Chen, Ningyu
    Zhang, Yichen
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) : 983 - 993
  • [3] Secure cloud file sharing scheme using blockchain and attribute-based encryption
    Almasian, Mohammadpayam
    Shafieinejad, Alireza
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [4] Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud
    Kang, Li
    Zhang, Leyou
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 3 - 18
  • [5] An Efficient Attribute-Based Encryption Scheme With Policy Update and File Update in Cloud Computing
    Li, Jianqiang
    Wang, Shulan
    Li, Yuan
    Wang, Haiyan
    Wang, Huiwen
    Wang, Huihui
    Chen, Jianyong
    You, Zhuhong
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6500 - 6509
  • [6] Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing
    Li, Yuan
    Wang, Haiyan
    Wang, Shulan
    Ding, Yong
    [J]. 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [7] Secure Internet of Things in Cloud Computing via Puncturable Attribute-Based Encryption With User Revocation
    Cui, Hui
    Yi, Xun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02) : 3662 - 3670
  • [8] Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
    Sun, Lei
    Zhao, Zhiyuan
    Wang, Jianhua
    Zhu, Zhiqiang
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 47 - 56
  • [9] TRAK-CPABE: A novel Traceable, Revocable and Accountable Ciphertext-Policy Attribute-Based Encryption scheme in cloud computing
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azzouz
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [10] Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage
    Liu, Hongwei
    Zhu, Ping
    Chen, Zehong
    Zhang, Peng
    Jiang, Zoe L.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 556 - 561