An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

被引:194
|
作者
Wang, Shulan [1 ]
Zhou, Junwei [2 ]
Liu, Joseph K. [3 ]
Yu, Jianping [1 ]
Chen, Jianyong [4 ]
Xie, Weixin [1 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, ATR Key Lab Natl Def Technol, Shenzhen 518060, Peoples R China
[2] Wuhan Univ Technol, Sch Comp Sci & Technol, Hubei Key Lab Transportat Internet Things, Wuhan 430070, Peoples R China
[3] Monash Univ, Fac Informat Technol, Clayton, Vic 3800, Australia
[4] Shenzhen Univ, Coll Comp & Software Engn, Shenzhen 518060, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; data sharing; file hierarchy; ciphertext-policy; attribute-based encryption; PROXY RE-ENCRYPTION; ACCESS-CONTROL; SECURE;
D O I
10.1109/TIFS.2016.2523941
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The shared data files generally have the characteristic of multilevel hierarchy, particularly in the area of healthcare and the military. However, the hierarchy structure of shared files has not been explored in CP-ABE. In this paper, an efficient file hierarchy attribute-based encryption scheme is proposed in cloud computing. The layered access structures are integrated into a single access structure, and then, the hierarchical files are encrypted with the integrated access structure. The ciphertext components related to attributes could be shared by the files. Therefore, both ciphertext storage and time cost of encryption are saved. Moreover, the proposed scheme is proved to be secure under the standard assumption. Experimental simulation shows that the proposed scheme is highly efficient in terms of encryption and decryption. With the number of the files increasing, the advantages of our scheme become more and more conspicuous.
引用
收藏
页码:1265 / 1277
页数:13
相关论文
共 50 条
  • [1] Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing
    Li, Jiguo
    Chen, Ningyu
    Zhang, Yichen
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) : 983 - 993
  • [2] An Efficient Attribute-Based Encryption Scheme With Policy Update and File Update in Cloud Computing
    Li, Jianqiang
    Wang, Shulan
    Li, Yuan
    Wang, Haiyan
    Wang, Huiwen
    Wang, Huihui
    Chen, Jianyong
    You, Zhuhong
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6500 - 6509
  • [3] Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud
    Kang, Li
    Zhang, Leyou
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 3 - 18
  • [4] Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing
    Li, Yuan
    Wang, Haiyan
    Wang, Shulan
    Ding, Yong
    [J]. 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [5] CR-FH-CPABE: Secure File Hierarchy Attribute-Based Encryption Scheme Supporting User Collusion Resistance in Cloud Computing
    Bai, Yuhan
    Fan, Kai
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 17727 - 17739
  • [6] Secure cloud file sharing scheme using blockchain and attribute-based encryption
    Almasian, Mohammadpayam
    Shafieinejad, Alireza
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [7] Attribute-based Encryption in Cloud Computing Environment
    Yan, Yuping
    Kamel, Mohammed B. M.
    Ligeti, Peter
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE, 2020, : 63 - 68
  • [8] Survey on attribute-based encryption in cloud computing
    Ancy, P.R.
    Krishna, Addapalli V.N.
    Balachandran, K.
    Balamurugan, M.
    Prakasi, O.S. Gnana
    [J]. International Journal of Network Security, 2020, 22 (05): : 863 - 868
  • [9] Hierarchy Attribute-Based Encryption Scheme to Support Direct Revocation in Cloud Storage
    Jiang Shuci
    Guo Weibin
    Fan Guisheng
    [J]. 2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 869 - 874
  • [10] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    [J]. SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 : 566 - 577