A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing

被引:10
|
作者
Fu, Junsong [1 ]
Wang, Na [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
基金
中国博士后科学基金;
关键词
Cloud computing; attribute-based document collection encryption; encryption/decryption efficiency; information security; KEYWORD SEARCH; SECURE;
D O I
10.1109/ACCESS.2019.2905346
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption can provide fine-grained access control and secure data sharing to the data users in cloud computing. However, the encryption/decryption efficiency of existing schemes can be further improved when encrypting a large document collection. In this paper, we propose a practical Ciphertext-Policy Attribute-Based Hierarchical document collection Encryption scheme named CP-ABHE. By practical, we mean that CP-ABHE is more efficient in both computation and storage space without sacrificing data security. In CP-ABHE, we first construct a set of integrated access trees based on the documents' attribute sets. We employ the greedy strategy to build the trees incrementally and grow the trees dynamically by combining the small ones. Then, all the documents on an integrated access tree are encrypted together. Different to existing schemes, the leaves in different access trees with the same attribute share the same secret number, which is employed to encrypt the documents. This greatly improves the performance of CP-ABHE. The security of our scheme is theoretically proved based on the decisional bilinear Diffie-Hellman assumption. The simulation results illustrate that CP-ABHE performs very well in terms of security, efficiency, and the storage size of the ciphertext.
引用
收藏
页码:36218 / 36232
页数:15
相关论文
共 50 条
  • [1] Security analyses of a data collaboration scheme with hierarchical attribute-based encryption in cloud computing
    Tai, Wei-Liang
    Chang, Ya-Fen
    Huang, Wen-Hsin
    International Journal of Network Security, 2020, 22 (02): : 212 - 217
  • [2] A Hierarchical Attribute-Based Encryption Scheme
    ZOU Xiubin
    Wuhan University Journal of Natural Sciences, 2013, 18 (03) : 259 - 264
  • [3] An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
    Wang, Shulan
    Zhou, Junwei
    Liu, Joseph K.
    Yu, Jianping
    Chen, Jianyong
    Xie, Weixin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1265 - 1277
  • [4] Survey on attribute-based encryption in cloud computing
    Ancy, P.R.
    Krishna, Addapalli V.N.
    Balachandran, K.
    Balamurugan, M.
    Prakasi, O.S. Gnana
    Ancy, P.R. (ancy.prasadam@res.christuniversity.in), 1600, Femto Technique Co., Ltd. (22): : 863 - 868
  • [5] Attribute-based Encryption in Cloud Computing Environment
    Yan, Yuping
    Kamel, Mohammed B. M.
    Ligeti, Peter
    2020 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE, 2020, : 63 - 68
  • [6] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 : 566 - 577
  • [7] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    INFOCOMMUNICATIONS JOURNAL, 2015, 7 (02): : 1 - 9
  • [8] Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
    Huang, Qinlong
    Yang, Yixian
    Shen, Mansuo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 239 - 249
  • [9] Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
    Chen H.-S.
    Shen Q.-L.
    2018, Beijing University of Posts and Telecommunications (41): : 113 - 118
  • [10] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267