An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

被引:194
|
作者
Wang, Shulan [1 ]
Zhou, Junwei [2 ]
Liu, Joseph K. [3 ]
Yu, Jianping [1 ]
Chen, Jianyong [4 ]
Xie, Weixin [1 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, ATR Key Lab Natl Def Technol, Shenzhen 518060, Peoples R China
[2] Wuhan Univ Technol, Sch Comp Sci & Technol, Hubei Key Lab Transportat Internet Things, Wuhan 430070, Peoples R China
[3] Monash Univ, Fac Informat Technol, Clayton, Vic 3800, Australia
[4] Shenzhen Univ, Coll Comp & Software Engn, Shenzhen 518060, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; data sharing; file hierarchy; ciphertext-policy; attribute-based encryption; PROXY RE-ENCRYPTION; ACCESS-CONTROL; SECURE;
D O I
10.1109/TIFS.2016.2523941
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The shared data files generally have the characteristic of multilevel hierarchy, particularly in the area of healthcare and the military. However, the hierarchy structure of shared files has not been explored in CP-ABE. In this paper, an efficient file hierarchy attribute-based encryption scheme is proposed in cloud computing. The layered access structures are integrated into a single access structure, and then, the hierarchical files are encrypted with the integrated access structure. The ciphertext components related to attributes could be shared by the files. Therefore, both ciphertext storage and time cost of encryption are saved. Moreover, the proposed scheme is proved to be secure under the standard assumption. Experimental simulation shows that the proposed scheme is highly efficient in terms of encryption and decryption. With the number of the files increasing, the advantages of our scheme become more and more conspicuous.
引用
收藏
页码:1265 / 1277
页数:13
相关论文
共 50 条
  • [31] An Attribute-Based Assured Deletion Scheme in Cloud Computing
    Shan, Fangfang
    Li, Hui
    Li, Fenghua
    Guo, Yunchuan
    Xiong, Jinbo
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2019, 14 (02) : 74 - 91
  • [32] An Efficient Revocable Attribute-Based Signcryption Scheme with Outsourced Designcryption in Cloud Computing
    Deng, Ningzhi
    Deng, Shaojiang
    Hu, Chunqiang
    Lei, Kaiwen
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019, 2019, 11604 : 84 - 97
  • [33] An Efficient Revocable Attribute-Based Signcryption Scheme With Outsourced Unsigncryption in Cloud Computing
    Deng, Ningzhi
    Deng, Shaojiang
    Hu, Chunqiang
    Lei, Kaiwen
    [J]. IEEE ACCESS, 2020, 8 : 42805 - 42815
  • [34] Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption
    Zhu, Shuaishuai
    Han, Yiliang
    Wei, Yuechuan
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 257 - 261
  • [35] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    [J]. ACM COMPUTING SURVEYS, 2020, 53 (04)
  • [36] Traceable and Weighted Attribute-Based Encryption Scheme in the Cloud Environment
    Yan, Xixi
    Yuan, Xiaohan
    Zhang, Qichao
    Tang, Yongli
    [J]. IEEE ACCESS, 2020, 8 : 38285 - 38295
  • [37] Efficient and accountable anti-leakage attribute-based encryption scheme for cloud storage
    Yan, Li
    Wang, Gaozhou
    Feng, Hongxin
    Liu, Peishun
    Gao, Haojie
    Zhang, Wenbin
    Hu, Hailin
    Pan, Fading
    [J]. HELIYON, 2024, 10 (12)
  • [38] An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud
    Ji, Honghan
    Zhang, Hongjie
    Shao, Lisong
    He, Debiao
    Luo, Min
    [J]. CONNECTION SCIENCE, 2021, 33 (04) : 1094 - 1115
  • [39] A keyword searchable attribute-based encryption scheme with attribute update for cloud storage
    Wang, Shangping
    Ye, Jian
    Zhang, Yaling
    [J]. PLOS ONE, 2018, 13 (05):
  • [40] Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
    Sun, Lei
    Zhao, Zhiyuan
    Wang, Jianhua
    Zhu, Zhiqiang
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 47 - 56