Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment

被引:0
|
作者
Nayudu P.P. [1 ]
Sekhar K.R. [1 ]
机构
[1] Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, AP, Vaddeswaram
来源
关键词
access policy; attribute; ciphertext; Cloud computing; CP-ABE; decryption; encryption; hash code; SHA-512;
D O I
10.32604/csse.2023.033961
中图分类号
学科分类号
摘要
The cloud allows clients to store and share data. Depending on the user's needs, it is imperative to design an effective access control plan to share the information only with approved users. The user loses control of their data when the data is outsourced to the cloud. Therefore, access control mechanisms will become a significant challenging problem. The Ciphertext-Policy Attribute- Based Encryption (CP-ABE) is an essential solution in which the user can control data access. CP-ABE encrypts the data under a limited access policy after the user sets some access policies. The user can decrypt the data if they satisfy the limited access policy. Although CP-ABE is an effective access control program, the privacy of the policy might be compromised by the attackers. Namely, the attackers can gather important information from plain text policy. To address this issue, the SHA-512 algorithm is presented to create a hash code for the user's attributes in this paper. Depending on the created hash codes, an access policy will be formed. It leads to protecting the access policy against attacks. The effectiveness of the proposed scheme is assessed based on decryption time, private key generation time, ciphertext generation time, and data verification time. © 2023 CRL Publishing. All rights reserved.
引用
收藏
页码:1079 / 1092
页数:13
相关论文
共 50 条
  • [31] Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing
    Wang, Qiang
    Peng, Li
    Xiong, Hu
    Sun, Jianfei
    Qin, Zhiguang
    IEEE ACCESS, 2018, 6 : 760 - 771
  • [32] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Yong CHENG
    Zhi-ying WANG
    Jun MA
    Jiang-jiang WU
    Song-zhu MEI
    Jiang-chun REN
    Frontiers of Information Technology & Electronic Engineering, 2013, (02) : 85 - 97
  • [33] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Cheng, Yong
    Wang, Zhi-ying
    Ma, Jun
    Wu, Jiang-jiang
    Mei, Song-zhu
    Ren, Jiang-chun
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (02): : 85 - 97
  • [34] Ciphertext-Policy Attribute-Based Encryption with Non-Monotonic Access Structure
    Jia Hong-Yong
    Chen Yue
    Mao Xiu-Qing
    Dou Rui-Yu
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL IV, 2010, : 484 - 487
  • [35] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Yong Cheng
    Zhi-ying Wang
    Jun Ma
    Jiang-jiang Wu
    Song-zhu Mei
    Jiang-chun Ren
    Journal of Zhejiang University SCIENCE C, 2013, 14 : 85 - 97
  • [36] An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
    Balu, A.
    Kuppusamy, K.
    INFORMATION SCIENCES, 2014, 276 : 354 - 362
  • [37] Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
    Ibraimi, Luan
    Petkovic, Milan
    Nikova, Svetla
    Hartel, Pieter
    Jonker, Willem
    INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 309 - +
  • [38] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu J.
    He X.
    Yan X.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [39] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [40] Online/offline ciphertext-policy attribute-based searchable encryption
    Chen D.
    Cao Z.
    Dong X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2365 - 2375