A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing

被引:10
|
作者
Fu, Junsong [1 ]
Wang, Na [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
基金
中国博士后科学基金;
关键词
Cloud computing; attribute-based document collection encryption; encryption/decryption efficiency; information security; KEYWORD SEARCH; SECURE;
D O I
10.1109/ACCESS.2019.2905346
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption can provide fine-grained access control and secure data sharing to the data users in cloud computing. However, the encryption/decryption efficiency of existing schemes can be further improved when encrypting a large document collection. In this paper, we propose a practical Ciphertext-Policy Attribute-Based Hierarchical document collection Encryption scheme named CP-ABHE. By practical, we mean that CP-ABHE is more efficient in both computation and storage space without sacrificing data security. In CP-ABHE, we first construct a set of integrated access trees based on the documents' attribute sets. We employ the greedy strategy to build the trees incrementally and grow the trees dynamically by combining the small ones. Then, all the documents on an integrated access tree are encrypted together. Different to existing schemes, the leaves in different access trees with the same attribute share the same secret number, which is employed to encrypt the documents. This greatly improves the performance of CP-ABHE. The security of our scheme is theoretically proved based on the decisional bilinear Diffie-Hellman assumption. The simulation results illustrate that CP-ABHE performs very well in terms of security, efficiency, and the storage size of the ciphertext.
引用
收藏
页码:36218 / 36232
页数:15
相关论文
共 50 条
  • [31] Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
    Wang, Shulan
    Liang, Kaitai
    Liu, Joseph K.
    Chen, Jianyong
    Yu, Jianping
    Xie, Weixin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1661 - 1673
  • [32] A Novel Attribute-Based Signcryption Scheme In Cloud Computing Environments
    Meng, Xianyong
    Meng, Xiangyu
    2016 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION (ICIA), 2016, : 1976 - 1979
  • [33] Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
    Qin, Baodong
    Zheng, Dong
    IEEE ACCESS, 2019, 7 : 42331 - 42342
  • [34] Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing
    Zhang, Yinghui
    Zheng, Dong
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 807 - 814
  • [35] BSA: Enhancing Attribute-Based Encryption in Cloud Computing with Decentralized Specification
    Li, Peiyao
    Cao, Heyang
    Wang, Mingsheng
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [36] Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2014, 57 (04): : 579 - 591
  • [37] An Attribute-Based Searchable Encryption Scheme for Cloud-Assisted IIoT
    Yin, Hui
    Zhang, Wei
    Deng, Hua
    Qin, Zheng
    Li, Keqin
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) : 11014 - 11023
  • [38] Cloud-Assisted Attribute-Based Searchable Encryption Scheme on Blockchain
    Niu S.
    Xie Y.
    Yang P.
    Du X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (04): : 811 - 821
  • [39] Attribute-based data transfer with filtering scheme in cloud computing
    Han, J. (jh843@uowmail.edu.au), 1600, Oxford University Press (57):
  • [40] Accountable specific attribute-based encryption scheme for cloud access control
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,