A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud

被引:38
|
作者
Premkamal, Praveen Kumar [1 ]
Pasupuleti, Syam Kumar [2 ]
Alphonse, P. J. A. [1 ]
机构
[1] Natl Inst Technol, Tiruchirappalli, Tamil Nadu, India
[2] Inst Dev & Res Banking Technol, Hyderabad, India
关键词
Cloud computing; Big data; Privacy; Access control; Outsourced CP-ABE; Correctness; MODULAR EXPONENTIATIONS; SECURITY;
D O I
10.1007/s12652-018-0967-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The foremost security concerns for big data in the cloud are privacy and access control. Ciphertext-policy attribute based encryption (CP-ABE) is an effective cryptographic solution for above concerns, but the existing CP-ABE schemes are not suitable for big data in the cloud as they require huge computation time for encryption and decryption process. In this paper, we propose a new verifiable outsourced CP-ABE for big data privacy and access control in the cloud. Our scheme reduces the computational overhead of encryption and decryption by outsourcing the heavy computations to the proxy server. Our scheme also verifies the correctness of the data along with the outsourcing computations. Further, our scheme limits the data access for a set of users instead of providing an infinite number of times data access, which is essentially required for commercial applications. In security analysis, we prove that our scheme is secure against chosen plain-text attack, collusion and proxy attacks. Performance analysis proves that our scheme is efficient.
引用
收藏
页码:2693 / 2707
页数:15
相关论文
共 50 条
  • [1] A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud
    Praveen Kumar Premkamal
    Syam Kumar Pasupuleti
    P. J. A. Alphonse
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 2693 - 2707
  • [2] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Hao Wang
    Debiao He
    Jian Shen
    Zhihua Zheng
    Chuan Zhao
    Minghao Zhao
    Soft Computing, 2017, 21 : 7325 - 7335
  • [3] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Wang, Hao
    He, Debiao
    Shen, Jian
    Zheng, Zhihua
    Zhao, Chuan
    Zhao, Minghao
    SOFT COMPUTING, 2017, 21 (24) : 7325 - 7335
  • [4] Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing
    Zhao, Zhiyuan
    Wang, Jianhua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (06): : 3254 - 3272
  • [5] Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud
    Li, Qi
    Zhu, Hongbo
    Ying, Zuobin
    Zhang, Tao
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [6] Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
    Nayudu P.P.
    Sekhar K.R.
    Computer Systems Science and Engineering, 2023, 46 (01): : 1079 - 1092
  • [7] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme in Power Cloud Access Control
    Li, Yuancheng
    Zhang, Pan
    Wang, Boyan
    APPLIED SCIENCES-BASEL, 2018, 8 (10):
  • [8] Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
    Yu, Jinxia
    He, Guanghui
    Yan, Xixi
    Tang, Yongli
    Qin, Rongxia
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [9] Enhancing Data Privacy Protection in Ciphertext-Policy Attribute-Based Encryption
    Patil, Sachin Popat
    Basthikodi, Mustafa
    Kumaraswamy, S.
    Gurpur, Ananth Prabhu
    Raga, Akashraj
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 1113 - 1124
  • [10] Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
    Xu, Jie
    Wen, Qiaoyan
    Li, Wenmin
    Jin, Zhengping
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (01) : 119 - 129