A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud

被引:38
|
作者
Premkamal, Praveen Kumar [1 ]
Pasupuleti, Syam Kumar [2 ]
Alphonse, P. J. A. [1 ]
机构
[1] Natl Inst Technol, Tiruchirappalli, Tamil Nadu, India
[2] Inst Dev & Res Banking Technol, Hyderabad, India
关键词
Cloud computing; Big data; Privacy; Access control; Outsourced CP-ABE; Correctness; MODULAR EXPONENTIATIONS; SECURITY;
D O I
10.1007/s12652-018-0967-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The foremost security concerns for big data in the cloud are privacy and access control. Ciphertext-policy attribute based encryption (CP-ABE) is an effective cryptographic solution for above concerns, but the existing CP-ABE schemes are not suitable for big data in the cloud as they require huge computation time for encryption and decryption process. In this paper, we propose a new verifiable outsourced CP-ABE for big data privacy and access control in the cloud. Our scheme reduces the computational overhead of encryption and decryption by outsourcing the heavy computations to the proxy server. Our scheme also verifies the correctness of the data along with the outsourcing computations. Further, our scheme limits the data access for a set of users instead of providing an infinite number of times data access, which is essentially required for commercial applications. In security analysis, we prove that our scheme is secure against chosen plain-text attack, collusion and proxy attacks. Performance analysis proves that our scheme is efficient.
引用
收藏
页码:2693 / 2707
页数:15
相关论文
共 50 条
  • [21] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [22] Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ma, Hui
    Zhang, Rui
    Wan, Zhiguo
    Lu, Yao
    Lin, Suqing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (06) : 679 - 692
  • [23] Comments on "Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation"
    Xiong, Hu
    Wang, Qiang
    Sun, Jianfei
    INFORMATION PROCESSING LETTERS, 2017, 127 : 67 - 70
  • [24] Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control
    Lang, Bo
    Xu, Runhua
    Duan, Yawei
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 147 - 157
  • [25] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27
  • [26] An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage
    Li, Ximing
    Wang, Hao
    Ma, Sha
    COMPUTER STANDARDS & INTERFACES, 2025, 91
  • [27] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [28] CIPHERTEXT-POLICY ATTRIBUTE BASED ENCRYPTION WITH SELECTIVELY-HIDDEN ACCESS POLICY
    Arkin, Gulmire
    Helil, Nurmamat
    COMPUTING AND INFORMATICS, 2021, 40 (05) : 1136 - 1159
  • [29] Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy
    Rao, Y. Sreenivasa
    Dutta, Ratna
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 275 - 286
  • [30] Unified Ciphertext-Policy Weighted Attribute-Based Encryption for Sharing Data in Cloud Computing
    Li, Wei
    Ni, Wei
    Liu, Dongxi
    Liu, Ren Ping
    Luo, Shoushan
    APPLIED SCIENCES-BASEL, 2018, 8 (12):