Enabling Access Control for Encrypted Multi-Dimensional Data in Cloud Computing through Range Search

被引:0
|
作者
Mei, Zhuolin [1 ]
Yu, Jing [1 ]
Huang, Jinzhou [2 ]
Wu, Bin [1 ]
Zhao, Zhiqiang [1 ]
Zhang, Caicai [3 ]
Wu, Zongda [4 ]
机构
[1] Jiujiang Univ, Sch Informat Sci & Technol, 551 Qianjin East Rd, Jiujiang 332005, Jiangxi, Peoples R China
[2] Hubei Univ Arts & Sci, Sch Comp Engn, 296 Longzhong Rd, Xiangyang 441053, Peoples R China
[3] Zhejiang Inst Mech & Elect Engn, Sch Modern Informat Technol, 999 Qingnian Rd, Hangzhou 310000, Zhejiang, Peoples R China
[4] Shaoxing Univ, Sch Math Informat, 508 Huancheng East Rd, Shaoxing 312000, Zhejiang, Peoples R China
来源
TEHNICKI VJESNIK-TECHNICAL GAZETTE | 2023年 / 30卷 / 06期
基金
中国国家自然科学基金;
关键词
access control; bucket embedding; ciphertext policy-attribute based encryption; cloud computing; policy design; range search; QUERIES; PRIVACY; SECURE;
D O I
10.17559/TV-20230415000536
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the growing popularity of cloud computing, data owners are increasingly opting to outsource their data to cloud servers due to the numerous benefits it offers. However, this outsourcing raises concerns about data privacy since the data stored on remote cloud servers is not directly controlled by the owners. Encryption of the data is an effective approach to mitigate these privacy concerns. However, encrypted data lacks distinguishability, leading to limitations in supporting common operations such as range search and access control. In this research paper, we propose a method called RSAC (Range Search Supporting Access Control) for encrypted multi-dimensional data in cloud computing. Our method leverages policy design, bucket embedding, algorithm design, and Ciphertext Policy-Attribute Based Encryption (CPABE) to achieve its objectives. We present extensive experimental results that demonstrate the efficiency of our method and conduct a thorough security analysis to ensure its robustness. Our proposed RSAC method addresses the challenges of range search and access control over encrypted multi-dimensional data, thus contributing to enhancing privacy and security in cloud computing environments.
引用
收藏
页码:1704 / 1716
页数:13
相关论文
共 50 条
  • [1] Keyword Search with Access Control over Encrypted Data in Cloud Computing
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    2014 IEEE 22ND INTERNATIONAL SYMPOSIUM OF QUALITY OF SERVICE (IWQOS), 2014, : 87 - 92
  • [2] Fast Range Query on Encrypted Multi-dimensional Data in Cloud Environment
    Mei, Zhuolin
    Zeng, Jing
    Zhang, Caicai
    Yao, Shimao
    Shi, Jiaoli
    Wu, Bin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2024, 18 (09): : 2717 - 2738
  • [3] Fast and private multi-dimensional range search over encrypted data
    Kermanshahi, Shabnam Kasra
    Steinfeld, Ron
    Yi, Xun
    Liu, Joseph K.
    Nepal, Surya
    Lou, Junwei
    INFORMATION SCIENCES, 2024, 652
  • [4] Secure multi-dimensional data retrieval with access control and range query in the cloud
    Mei, Zhuolin
    Yu, Jin
    Zhang, Caicai
    Wu, Bin
    Yao, Shimao
    Shi, Jiaoli
    Wu, Zongda
    INFORMATION SYSTEMS, 2024, 122
  • [5] Fast Multi-dimensional Range Queries on Encrypted Cloud Databases
    Chi, Jialin
    Hong, Cheng
    Zhang, Min
    Zhang, Zhenfeng
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2017), PT I, 2017, 10177 : 559 - 575
  • [6] Multi-dimensional range query over encrypted data
    Shi, Elaine
    Bethencourt, John
    Chan, T-H. Hubert
    Song, Dawn
    Perrig, Adrian
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 350 - +
  • [7] Efficient and secure multi-dimensional geometric range query over encrypted data in cloud
    Li, Xingxin
    Zhu, Youwen
    Wang, Jian
    Zhang, Ji
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 131 : 44 - 54
  • [8] Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy
    Wang, Boyang
    Hou, Yantian
    Li, Ming
    Wang, Haitao
    Li, Hui
    Li, Fenghua
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 374 - 394
  • [9] Dynamic access control of encrypted data in cloud computing environment
    Xiang S.
    Zhu Z.
    International Journal of Performability Engineering, 2019, 15 (03) : 969 - 976
  • [10] Keyword Search With Access Control Over Encrypted Cloud Data
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    IEEE SENSORS JOURNAL, 2017, 17 (03) : 858 - 868