An Improved Ciphertext-Policy Attribute-Based Encryption Scheme in Power Cloud Access Control

被引:1
|
作者
Li, Yuancheng [1 ]
Zhang, Pan [1 ,2 ]
Wang, Boyan [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
[2] State Grid Informat & Telecommun Branch, Beijing 100761, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2018年 / 8卷 / 10期
关键词
power cloud; access control; CP-ABE; action audit; PRIVACY;
D O I
10.3390/app8101836
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In power cloud environment, the existing Ciphertext-Policy Attribute-Based Encryption (CP-ABE) access control schemes, do not consider the generation of access structure and the existence of malicious users. To tackle these problems, a power cloud access control (PCAC) scheme is proposed, which improves the traditional CP-ABE access control model. Considering the heavy time consumption of CP-ABE, PCAC encrypts the symmetric key, instead of the raw data. PCAC combines the access tree and linear secret-sharing scheme (LSSS) to achieve the automatic generation and efficient operation of access structure. Additionally, an action audit phase, based on zero-knowledge verification was designed to defend against malicious users. The experiments proved that PCAC meets the requirement of fine-grained access control, in a power cloud. Compared with existing CP-ABE schemes, the PCAC scheme reduced about half of the time consumption, in the action audit phase and costs about one-third the time, in the data obtainment stage.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability
    Liu, Zhenhua
    Xu, Jing
    Liu, Yan
    Wang, Baocang
    [J]. IEEE ACCESS, 2019, 7 : 66832 - 66844
  • [22] Forward-secure ciphertext-policy attribute-based encryption scheme
    State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Information Engineering University, Zhengzhou
    450001, China
    [J]. Wei, Jiang-Hong, 1600, Editorial Board of Journal on Communications (35):
  • [23] Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption
    Rao, Y. Sreenivasa
    Dutta, Ratna
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013, 2013, 8099 : 66 - 81
  • [24] A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption
    Malluhi, Qutaibah M.
    Shikfa, Abdullatif
    Viet Cuong Trinh
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 230 - 240
  • [25] Server Aided Ciphertext-Policy Attribute-Based Encryption
    Wang, Hao
    Yang, Bo
    Wang, Yilei
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 440 - 444
  • [26] An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures
    Cui, Hui
    Deng, Robert H.
    Wu, Guowei
    Lai, Junzuo
    [J]. PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 19 - 38
  • [27] GPU Acceleration of Ciphertext-Policy Attribute-Based Encryption
    Fan, Kai
    Zhang, Chaoyu
    Shan, Ruiwen
    Yu, Hexuan
    Jiang, Hai
    [J]. 2019 20TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2019, : 94 - 101
  • [28] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Oualha, Nouha
    Laurent, Maryline
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 169 - 183
  • [29] Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data
    Liu, Ximeng
    Ma, Jianfeng
    Xiong, Jinbo
    Liu, Guangjun
    [J]. International Journal of Network Security, 2014, 16 (06) : 437 - 443
  • [30] A Trustworthy Ciphertext-Policy Attribute-Based Encryption Access Control Method Based on FAME and Blockchain
    Zhou, Zijian
    Bai, Fenhua
    Liu, Yingli
    Zhang, Chi
    Shen, Tao
    [J]. PROCEEDINGS OF 2022 4TH BLOCKCHAIN AND INTERNET OF THINGS CONFERENCE, BIOTC 2022, 2022, : 38 - 45