Enhanced Dual-Policy Attribute-Based Encryption for Secure Data Sharing in the Cloud

被引:4
|
作者
Wang, Ti [1 ,2 ]
Zhou, Yongbin [1 ,2 ,3 ]
Ma, Hui [1 ,2 ]
Zhang, Rui [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing 210094, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
ORDER GROUPS; FRAMEWORK;
D O I
10.1155/2022/1867584
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a promising service paradigm, cloud computing has attracted lots of enterprises and individuals to outsource big data to public cloud. To facilitate secure data using and sharing, dual-policy attribute-based encryption (DP-ABE) is a suitable solution. It allows two access control mechanisms over encrypted data at the same time: one involves access policies over subjective attributes ascribed to user credentials, and the other involves policies over objective attributes ascribed to data. In this work, we are exploring methods to make DP-ABE more flexible, more efficient, and more secure for deployments in cloud scenes. Our proposal features the following achievements simultaneously: (1) beyond the access control mechanisms of DP-ABE, it also supports two flexible features called encryption and key generation in single-policy modes; (2) most operations of key generation, encryption, and decryption are securely outsourced to cloud servers, leaving extremely low overheads for the PKG, data owners, and users; and (3) it realizes the strongest security notion of public-key encryption schemes, namely, CCA security. We formalize the security definition and formally prove its security in the random oracle model. Moreover, we implement the proposed schemes using the Charm framework. The experiment results demonstrate that our schemes are efficient and practical.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] Fine-Grained Access Control for Cloud Data Sharing by Secure and Efficient Attribute-Revocable Ciphertext-Policy Attribute-Based Encryption
    Vaanchig, Nyamsuren
    Chen, Wei
    Qin, Zhiguang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (10): : 303 - 319
  • [22] Secure Cloud Data Access: Unifying Quantum Key Distribution and Attribute-Based Encryption for Enhanced Data Protection
    Kumar A.
    Verma G.
    SN Computer Science, 4 (6)
  • [23] SecCloudSharing: Secure data sharing in public cloud using ciphertext-policy attribute-based proxy re-encryption with revocation
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (05)
  • [24] Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data
    Naik, Mohan R.
    Gadiyar, H. Manoj T.
    Sharath, S. M.
    Bharathrajkumar, M.
    Sowmya, T. K.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2024, 20 (05) : 593 - 606
  • [25] A Comparative Study of Attribute-Based Encryption Schemes for Secure Cloud Data Outsourcing
    Thangavel, M.
    Varalakshmi, P.
    Abinaya, C.
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 261 - 266
  • [26] Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
    Huang, Qinlong
    Yang, Yixian
    Shen, Mansuo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 239 - 249
  • [27] Attribute-Based Encryption Approach for Storage, Sharing and Retrieval of Encrypted Data in the Cloud
    Morales-Sandoval, Miguel
    Cabello, Melissa Hinojosa
    Marin-Castro, Heidy Marisol
    Compean, Jose Luis Gonzalez
    IEEE ACCESS, 2020, 8 (170101-170116) : 170101 - 170116
  • [28] Parallel incremental attribute-based encryption for mobile cloud data storage and sharing
    Ke, Gang
    Wang, Shi
    Wu, Huan-huan
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [29] Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing
    Zhao, Xiaolong
    Huang, Zhenjie
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (08): : 10437 - 10453
  • [30] Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext
    Rao, Y. Sreenivasa
    Dutta, Ratna
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 288 - 308