BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing

被引:21
|
作者
Zuo, Yuting [1 ]
Kang, Zhaozhe [1 ]
Xu, Jian [1 ]
Chen, Zhide [1 ]
机构
[1] Fujian Normal Univ, Cangshan Campus,8 Shangsan Rd, Fuzhou 350007, Fujian, Peoples R China
关键词
Blockchain; ciphertext-policy attribute-based encryption; data sharing security; cloud computing;
D O I
10.1177/1550147721999616
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is the most important and challenging problem to share the data safely in cloud computing. Some so-called trusted third parties may also infringe users' data privacy. It is an urgent problem for data owners to share data safely with the designated users rather than the third party or other users. Traditional encryption schemes utilize different keys to produce multiple encrypted copies of the same data for users. It is no longer applicable for cloud data sharing security. Attribute-based encryption can solve above problems, but it needs to rely on trusted third parties to protect the users' privacy. In this article, in order to address the above problems, we propose a blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data secure sharing without relying on any trusted third parties. Blockchain-based ciphertext-policy attribute-based encryption scheme can protect the rights and security of data owner. Compared with existing cloud security schemes, the proposed scheme has more advantages in terms of the six aspects: (1) data owners have the authority to decide who can decrypt the data; (2) the operations of users are retained permanently, and all records are tamper-proof; (3) our proposed scheme has the characteristic of "one-to-many" encryption, and data is encrypted only once; (4) our scheme does not rely on any trusted third party; (5) in terms of the discrete logarithm problem and decisional q parallel-bilinear Diffie-Hellman exponent problem, we prove that our proposed scheme is secure; and (6) experiment shows that our proposed scheme is more efficient than the comparative scheme.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] DSSPS: A Data Sharing Security Protection Scheme Based on Consortium Blockchain and Ciphertext-Policy Attribute-Based Encryption
    Han, Daojun
    Chen, Jinyu
    Zang, Guoqing
    Wang, Xueheng
    Gao, Yihua
    [J]. ICBTA 2019: 2019 2ND INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, 2019, : 14 - 19
  • [2] Security analysis for a ciphertext-policy attribute-based encryption scheme
    Zeng, Fugeng
    Xu, Chunxiang
    Zhang, Xinpeng
    [J]. Advances in Information Sciences and Service Sciences, 2012, 4 (12): : 201 - 207
  • [3] Unified Ciphertext-Policy Weighted Attribute-Based Encryption for Sharing Data in Cloud Computing
    Li, Wei
    Ni, Wei
    Liu, Dongxi
    Liu, Ren Ping
    Luo, Shoushan
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (12):
  • [4] Blockchain-Based Multi-Authority Ciphertext-Policy Attribute-Based Encryption Scheme with Equality Test
    Yang, Xiao-Dong
    Chen, Ai-Jia
    Wang, Zhi-Song
    Liao, Ze-Fan
    Wang, Cai-Fen
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2024, 52 (03): : 898 - 908
  • [5] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme
    Zheng, Hua
    Zhang, Xi
    Yang, Qi
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 400 - 411
  • [6] Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
    Asim, Muhammad
    Ibraimi, Luan
    Petkovic, Milan
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 244 - +
  • [7] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [8] Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing
    Guan, Zhitao
    Li, Jing
    Zhang, Zijian
    Zhu, Liehuang
    [J]. MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [9] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Omote, Kazumasa
    Soshi, Masakazu
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 13 - +
  • [10] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu, Jinxia
    He, Xu
    Yan, Xixi
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57