Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment

被引:0
|
作者
Nayudu P.P. [1 ]
Sekhar K.R. [1 ]
机构
[1] Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, AP, Vaddeswaram
来源
关键词
access policy; attribute; ciphertext; Cloud computing; CP-ABE; decryption; encryption; hash code; SHA-512;
D O I
10.32604/csse.2023.033961
中图分类号
学科分类号
摘要
The cloud allows clients to store and share data. Depending on the user's needs, it is imperative to design an effective access control plan to share the information only with approved users. The user loses control of their data when the data is outsourced to the cloud. Therefore, access control mechanisms will become a significant challenging problem. The Ciphertext-Policy Attribute- Based Encryption (CP-ABE) is an essential solution in which the user can control data access. CP-ABE encrypts the data under a limited access policy after the user sets some access policies. The user can decrypt the data if they satisfy the limited access policy. Although CP-ABE is an effective access control program, the privacy of the policy might be compromised by the attackers. Namely, the attackers can gather important information from plain text policy. To address this issue, the SHA-512 algorithm is presented to create a hash code for the user's attributes in this paper. Depending on the created hash codes, an access policy will be formed. It leads to protecting the access policy against attacks. The effectiveness of the proposed scheme is assessed based on decryption time, private key generation time, ciphertext generation time, and data verification time. © 2023 CRL Publishing. All rights reserved.
引用
收藏
页码:1079 / 1092
页数:13
相关论文
共 50 条
  • [21] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    SENSORS, 2019, 19 (07)
  • [22] An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update
    Wang, Changji
    Yuan, Yuan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 1031 - 1041
  • [23] Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
    Yu, Gang
    Wang, Yongjuan
    Cao, Zhenfu
    Lin, Jian
    Wang, Xiangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04):
  • [24] Astrape: An Efficient Concurrent Cloud Attestation with Ciphertext-Policy Attribute-Based Encryption
    Ba, Haihe
    Zhou, Huaizhe
    Mei, Songzhu
    Qiao, Huidong
    Hong, Tie
    Wang, Zhiying
    Ren, Jiangchun
    SYMMETRY-BASEL, 2018, 10 (10):
  • [25] Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing
    Guan, Zhitao
    Li, Jing
    Zhang, Zijian
    Zhu, Liehuang
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [26] Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
    Yu, Jinxia
    He, Guanghui
    Yan, Xixi
    Tang, Yongli
    Qin, Rongxia
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [27] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Omote, Kazumasa
    Soshi, Masakazu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 13 - +
  • [28] Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing
    Zhang, Leyou
    Gao, Xiaoxu
    Guo, Fuchun
    Hu, Gongcheng
    IEEE ACCESS, 2020, 8 : 94033 - 94042
  • [29] An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud
    Li, Hao
    Deng, Lianbing
    Yang, Cheng
    Liu, Jianbo
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (02)
  • [30] Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing
    Zhao, Zhiyuan
    Wang, Jianhua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (06): : 3254 - 3272