Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage

被引:1
|
作者
Zhang, Qiuyu [1 ]
Zhao, Zhenyu [1 ]
Fu, Minrui [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
基金
中国国家自然科学基金;
关键词
USER REVOCATION;
D O I
10.1155/2021/9606240
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to ensure the confidentiality and secure sharing of speech data, and to solve the problems of slow deployment of attribute encryption systems and fine-grained access control in cloud storage, a speech encryption scheme based on ciphertext policy hierarchical attributes was proposed. First, perform hierarchical processing of the attributes of the speech data to reflect the hierarchical structure and integrate the hierarchical access structure into a single-access structure. Second, use the attribute fast encryption framework to construct the attribute encryption scheme of the speech data, and use the integrated access to the speech data; thus, the structure is encrypted and uploaded to the cloud for storage and sharing. Finally, use the hardness of decisional bilinear Diffie-Hellman (DBDH) assumption to prove that the proposed scheme is secure in the random oracle model. The theoretical security analysis and experimental results show that the proposed scheme can achieve efficient and fine-grained access control and is secure and extensible.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] A Survey on Secured Data Sharing using Ciphertext Policy Attribute Based Encryption in Cloud
    Thushara, G. A.
    Bhanu, S. Mary Saira
    2021 8TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS (ICSCC), 2021, : 170 - 177
  • [42] Privacy Preserving Ciphertext Policy Attribute Based Encryption
    Balu, A.
    Kuppusamy, K.
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 402 - 409
  • [43] Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption
    Kumar, G. Sravan
    Krishna, A. Sri
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (04) : 12 - 27
  • [44] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Hao Wang
    Debiao He
    Jian Shen
    Zhihua Zheng
    Chuan Zhao
    Minghao Zhao
    Soft Computing, 2017, 21 : 7325 - 7335
  • [45] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Wang, Hao
    He, Debiao
    Shen, Jian
    Zheng, Zhihua
    Zhao, Chuan
    Zhao, Minghao
    SOFT COMPUTING, 2017, 21 (24) : 7325 - 7335
  • [46] A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud System
    Lin, Han-Yu
    Jiang, Yan-Ru
    APPLIED SCIENCES-BASEL, 2021, 11 (01): : 1 - 14
  • [47] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [48] BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing
    Zuo, Yuting
    Kang, Zhaozhe
    Xu, Jian
    Chen, Zhide
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (03)
  • [49] A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext
    Wang, Chang-Ji
    Luo, Jian-Fa
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 447 - 451
  • [50] Traceable-then-revocable ciphertext-policy attribute-based encryption scheme
    Liu, Zhenhua
    Duan, Shuhong
    Zhou, Peilin
    Wang, Baocang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 903 - 913