Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption

被引:3
|
作者
Kumar, G. Sravan [1 ]
Krishna, A. Sri [2 ]
机构
[1] Acharya Nagarjuna Univ, Guntur, Andhra Pradesh, India
[2] RVR & JC Coll Engn, Dept IT, Guntur, Andhra Pradesh, India
关键词
Bloom Filters; Cloud Storage; CP-ABE; Data Providers; Fine-Grained Access Control; LSSS; GRAINED ACCESS-CONTROL; PRIVACY; EFFICIENT; SYSTEM;
D O I
10.4018/IJISP.2019100102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud data storage environments allow the data providers to store and share large amounts of datasets generated from various resources. However, outsourcing private data to a cloud server is insecure without an efficient access control strategy. Thus, it is important to protect the data and privacy of user with a fine-grained access control policy. In this article, a Bloom Filter-based Ciphertext-Policy Attribute-Based Encryption (BF-CP-ABE) technique is presented to provide data security to cloud datasets with a Linear Secret Sharing Structure (LSSS) access policy. This fine-grained access control scheme hides the whole attribute set in the ciphertext, whereas in previous CP-ABE methods, the attributes are partially hidden in the ciphertext which in turn leaks private information about the user. Since the attribute set of the BF-CP-ABE technique is hidden, bloom filters are used to identify the authorized users during data decryption. The BF-CP-ABE technique is designed to be selective secure under an Indistinguishable-Chosen Plaintext attack and the simulation results show that the communication overhead is significantly reduced with the adopted LSSS access policy.
引用
收藏
页码:12 / 27
页数:16
相关论文
共 50 条
  • [1] HHDSSC: Harnessing healthcare data security in cloud using ciphertext policy attribute-based encryption
    Ramesh, Dharavath
    Sharma, Rashmi Priya
    Edla, Damodar Reddy
    [J]. International Journal of Information and Computer Security, 2020, 13 (3-4): : 322 - 336
  • [2] A Survey on Secured Data Sharing using Ciphertext Policy Attribute Based Encryption in Cloud
    Thushara, G. A.
    Bhanu, S. Mary Saira
    [J]. 2021 8TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS (ICSCC), 2021, : 170 - 177
  • [3] BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing
    Zuo, Yuting
    Kang, Zhaozhe
    Xu, Jian
    Chen, Zhide
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (03):
  • [4] Collaborative Key Management in Ciphertext Policy Attribute Based Encryption for Cloud
    Ghuge, Mayur N.
    Chatur, Prashant N.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 156 - 158
  • [5] Bounded ciphertext policy attribute based encryption
    Goyal, Vipul
    Jain, Abhishek
    Pandey, Omkant
    Sahai, Amit
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 579 - 591
  • [6] Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
    Zhang, Qiuyu
    Zhao, Zhenyu
    Fu, Minrui
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1860 - 1865
  • [8] Unified Ciphertext-Policy Weighted Attribute-Based Encryption for Sharing Data in Cloud Computing
    Li, Wei
    Ni, Wei
    Liu, Dongxi
    Liu, Ren Ping
    Luo, Shoushan
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (12):
  • [9] Multi authority Ciphertext-Policy Attribute-Based encryption for security enhancement in cloud storage unit
    Catherine, V. Reena
    Nargunam, A. Shajin
    [J]. SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2022, 53
  • [10] Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator
    Chen, Yuechen
    Jiang, Zoe L.
    Yiu, S. M.
    Liu, Joseph K.
    Au, Man Ho
    Wang, Xuan
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 274 - 289