An Improved Ciphertext-Policy Attribute-Based Encryption Scheme in Power Cloud Access Control

被引:1
|
作者
Li, Yuancheng [1 ]
Zhang, Pan [1 ,2 ]
Wang, Boyan [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
[2] State Grid Informat & Telecommun Branch, Beijing 100761, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2018年 / 8卷 / 10期
关键词
power cloud; access control; CP-ABE; action audit; PRIVACY;
D O I
10.3390/app8101836
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In power cloud environment, the existing Ciphertext-Policy Attribute-Based Encryption (CP-ABE) access control schemes, do not consider the generation of access structure and the existence of malicious users. To tackle these problems, a power cloud access control (PCAC) scheme is proposed, which improves the traditional CP-ABE access control model. Considering the heavy time consumption of CP-ABE, PCAC encrypts the symmetric key, instead of the raw data. PCAC combines the access tree and linear secret-sharing scheme (LSSS) to achieve the automatic generation and efficient operation of access structure. Additionally, an action audit phase, based on zero-knowledge verification was designed to defend against malicious users. The experiments proved that PCAC meets the requirement of fine-grained access control, in a power cloud. Compared with existing CP-ABE schemes, the PCAC scheme reduced about half of the time consumption, in the action audit phase and costs about one-third the time, in the data obtainment stage.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Astrape: An Efficient Concurrent Cloud Attestation with Ciphertext-Policy Attribute-Based Encryption
    Ba, Haihe
    Zhou, Huaizhe
    Mei, Songzhu
    Qiao, Huidong
    Hong, Tie
    Wang, Zhiying
    Ren, Jiangchun
    [J]. SYMMETRY-BASEL, 2018, 10 (10):
  • [32] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    Xu Peng
    Tang Yong
    Jiang Wenbin
    Jin Hai
    Zou Deqing
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 655 - 660
  • [33] Ciphertext-policy attribute-based encryption with short keys
    [J]. Jiang, Wenbin, 1600, Chinese Institute of Electronics (23):
  • [34] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    XU Peng
    TANG Yong
    JIANG Wenbin
    JIN Hai
    ZOU Deqing
    [J]. Chinese Journal of Electronics, 2014, 23 (04) : 655 - 660
  • [35] Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
    Yu, Gang
    Wang, Yongjuan
    Cao, Zhenfu
    Lin, Jian
    Wang, Xiangyu
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04):
  • [36] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Nouha Oualha
    Maryline Laurent
    [J]. World Wide Web, 2018, 21 : 169 - 183
  • [37] Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control
    Lang, Bo
    Xu, Runhua
    Duan, Yawei
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 147 - 157
  • [38] SCAuth: Selective Cloud User Authorization for Ciphertext-Policy Attribute-Based Access Control
    Sultan, Nazatul Haque
    Barbhuiya, Ferdous Ahmed
    Sarma, Nityananda
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM 2017), 2017, : 93 - 98
  • [39] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    [J]. SENSORS, 2019, 19 (07)
  • [40] CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme
    Yin, Hui
    Zhang, Jixin
    Xiong, Yinqiao
    Ou, Lu
    Li, Fangmin
    Liao, Shaolin
    Li, Keqin
    [J]. IEEE ACCESS, 2019, 7 : 5682 - 5694