An Improved Ciphertext-Policy Attribute-Based Encryption Scheme in Power Cloud Access Control

被引:1
|
作者
Li, Yuancheng [1 ]
Zhang, Pan [1 ,2 ]
Wang, Boyan [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
[2] State Grid Informat & Telecommun Branch, Beijing 100761, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2018年 / 8卷 / 10期
关键词
power cloud; access control; CP-ABE; action audit; PRIVACY;
D O I
10.3390/app8101836
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In power cloud environment, the existing Ciphertext-Policy Attribute-Based Encryption (CP-ABE) access control schemes, do not consider the generation of access structure and the existence of malicious users. To tackle these problems, a power cloud access control (PCAC) scheme is proposed, which improves the traditional CP-ABE access control model. Considering the heavy time consumption of CP-ABE, PCAC encrypts the symmetric key, instead of the raw data. PCAC combines the access tree and linear secret-sharing scheme (LSSS) to achieve the automatic generation and efficient operation of access structure. Additionally, an action audit phase, based on zero-knowledge verification was designed to defend against malicious users. The experiments proved that PCAC meets the requirement of fine-grained access control, in a power cloud. Compared with existing CP-ABE schemes, the PCAC scheme reduced about half of the time consumption, in the action audit phase and costs about one-third the time, in the data obtainment stage.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing
    Xie, Xingxing
    Ma, Hua
    Li, Jin
    Chen, Xiaofeng
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (16) : 2349 - 2367
  • [42] Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing
    Zhang, Leyou
    Gao, Xiaoxu
    Guo, Fuchun
    Hu, Gongcheng
    [J]. IEEE ACCESS, 2020, 8 : 94033 - 94042
  • [43] Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing
    Zhao, Zhiyuan
    Wang, Jianhua
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (06): : 3254 - 3272
  • [44] An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud
    Li, Hao
    Deng, Lianbing
    Yang, Cheng
    Liu, Jianbo
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (02)
  • [45] Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing
    Wang, Qiang
    Peng, Li
    Xiong, Hu
    Sun, Jianfei
    Qin, Zhiguang
    [J]. IEEE ACCESS, 2018, 6 : 760 - 771
  • [46] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Yong CHENG
    Zhi-ying WANG
    Jun MA
    Jiang-jiang WU
    Song-zhu MEI
    Jiang-chun REN
    [J]. Frontiers of Information Technology & Electronic Engineering, 2013, (02) : 85 - 97
  • [47] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Cheng, Yong
    Wang, Zhi-ying
    Ma, Jun
    Wu, Jiang-jiang
    Mei, Song-zhu
    Ren, Jiang-chun
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (02): : 85 - 97
  • [48] Identity-based Access Control for Digital Content based on Ciphertext-Policy Attribute-Based Encryption
    Huang, Win-Bin
    Su, Wei-Tsung
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 87 - 91
  • [49] Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Yin, Hongjian
    Zhang, Leyou
    Cui, Yilei
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2768 - 2780
  • [50] A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Arithmetic Span Program
    Wei D.
    Gao H.-Y.
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (10): : 1993 - 2002