Enhanced Dual-Policy Attribute-Based Encryption for Secure Data Sharing in the Cloud

被引:4
|
作者
Wang, Ti [1 ,2 ]
Zhou, Yongbin [1 ,2 ,3 ]
Ma, Hui [1 ,2 ]
Zhang, Rui [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing 210094, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
ORDER GROUPS; FRAMEWORK;
D O I
10.1155/2022/1867584
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a promising service paradigm, cloud computing has attracted lots of enterprises and individuals to outsource big data to public cloud. To facilitate secure data using and sharing, dual-policy attribute-based encryption (DP-ABE) is a suitable solution. It allows two access control mechanisms over encrypted data at the same time: one involves access policies over subjective attributes ascribed to user credentials, and the other involves policies over objective attributes ascribed to data. In this work, we are exploring methods to make DP-ABE more flexible, more efficient, and more secure for deployments in cloud scenes. Our proposal features the following achievements simultaneously: (1) beyond the access control mechanisms of DP-ABE, it also supports two flexible features called encryption and key generation in single-policy modes; (2) most operations of key generation, encryption, and decryption are securely outsourced to cloud servers, leaving extremely low overheads for the PKG, data owners, and users; and (3) it realizes the strongest security notion of public-key encryption schemes, namely, CCA security. We formalize the security definition and formally prove its security in the random oracle model. Moreover, we implement the proposed schemes using the Charm framework. The experiment results demonstrate that our schemes are efficient and practical.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Dual-Policy Attribute Based Encryption
    Attrapadung, Nuttapong
    Imai, Hideki
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 168 - 185
  • [2] Secure Sharing of IOT Data in Cloud Environment Using Attribute-Based Encryption
    Kanimozhi, P.
    Victoire, T. Aruldoss Albert
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (06)
  • [3] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    FU Jingyi
    HUANG Qinlong
    MA Zhaofeng
    YANG Yixian
    [J]. TheJournalofChinaUniversitiesofPostsandTelecommunications., 2014, 21 (06) - 51+77
  • [4] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    FU Jing-yi
    HUANG Qin-long
    MA Zhao-feng
    YANG Yi-xian
    [J]. The Journal of China Universities of Posts and Telecommunications, 2014, (06) : 45 - 51
  • [5] Attribute-Based Encryption Scheme for Secure Multi-Group Data Sharing in Cloud
    Islam, Md Azharul
    Madria, Sanjay K.
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 2158 - 2172
  • [6] A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
    Liang, Kaitai
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Wong, Duncan S.
    Yang, Guomin
    Yu, Yong
    Yang, Anjia
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 95 - 108
  • [7] Secure Data Sharing and Retrieval Using Attribute-Based Encryption in Cloud-Based OSNs
    HUANG Qinlong
    MA Zhaofeng
    YANG Yixian
    FU Jingyi
    NIU Xinxin
    [J]. Chinese Journal of Electronics, 2014, 23 (03) : 557 - 563
  • [8] Secure Data Sharing and Retrieval Using Attribute-Based Encryption in Cloud-Based OSNs
    Huang Qinlong
    Ma Zhaofeng
    Yang Yixian
    Fu Jingyi
    Niu Xinxin
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (03) : 557 - 563
  • [9] Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation
    Islam, Md Azharul
    Madria, Sanjay
    [J]. SECURITY AND PRIVACY, 2024, 7 (01):
  • [10] Verifiable attribute-based proxy re-encryption for secure public cloud data sharing
    Lin, Suqing
    Zhang, Rui
    Wang, Mingsheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1748 - 1758