Enhanced Dual-Policy Attribute-Based Encryption for Secure Data Sharing in the Cloud

被引:4
|
作者
Wang, Ti [1 ,2 ]
Zhou, Yongbin [1 ,2 ,3 ]
Ma, Hui [1 ,2 ]
Zhang, Rui [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing 210094, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
ORDER GROUPS; FRAMEWORK;
D O I
10.1155/2022/1867584
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a promising service paradigm, cloud computing has attracted lots of enterprises and individuals to outsource big data to public cloud. To facilitate secure data using and sharing, dual-policy attribute-based encryption (DP-ABE) is a suitable solution. It allows two access control mechanisms over encrypted data at the same time: one involves access policies over subjective attributes ascribed to user credentials, and the other involves policies over objective attributes ascribed to data. In this work, we are exploring methods to make DP-ABE more flexible, more efficient, and more secure for deployments in cloud scenes. Our proposal features the following achievements simultaneously: (1) beyond the access control mechanisms of DP-ABE, it also supports two flexible features called encryption and key generation in single-policy modes; (2) most operations of key generation, encryption, and decryption are securely outsourced to cloud servers, leaving extremely low overheads for the PKG, data owners, and users; and (3) it realizes the strongest security notion of public-key encryption schemes, namely, CCA security. We formalize the security definition and formally prove its security in the random oracle model. Moreover, we implement the proposed schemes using the Charm framework. The experiment results demonstrate that our schemes are efficient and practical.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme
    Sepehri, Masoomeh
    Trombetta, Alberto
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [42] BDAE: A Blockchain-Based and Decentralized Attribute-Based Encryption Scheme for Secure Data Sharing
    YANG Shuangxi
    WuhanUniversityJournalofNaturalSciences, 2024, 29 (03) : 228 - 238
  • [43] BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing
    Zuo, Yuting
    Kang, Zhaozhe
    Xu, Jian
    Chen, Zhide
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (03)
  • [44] Secured Data Sharing in Groups Using Attribute-Based Broadcast Encryption in Hybrid Cloud
    Poornima, E.
    Kasiviswanath, N.
    Bindu, C. Shoba
    EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 707 - 718
  • [45] Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    Guo, Minyi
    COMPUTERS & SECURITY, 2011, 30 (05) : 320 - 331
  • [46] Protecting data in cloud environment with attribute-based encryption
    Zhu, Shuaishuai
    Yang, Xiaoyuan
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (02) : 91 - 97
  • [47] Enhanced Secure Attribute-Based Dynamic Data Sharing Scheme With Efficient Access Policy Hiding and Policy Updating for IoMT
    Zhang, Leyou
    Xie, Shuwei
    Wu, Qing
    Rezaeibagha, Fatemeh
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (16): : 27435 - 27447
  • [48] Secure attribute-based data sharing for resource-limited users in cloud computing
    Li, Jin
    Zhang, Yinghui
    Chen, Xiaofeng
    Xiang, Yang
    COMPUTERS & SECURITY, 2018, 72 : 1 - 12
  • [49] An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud
    Li, Hao
    Deng, Lianbing
    Yang, Cheng
    Liu, Jianbo
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (02)
  • [50] Secure document sharing model based on blockchain technology and attribute-based encryption
    Garima Verma
    Soumen Kanrar
    Multimedia Tools and Applications, 2024, 83 : 16377 - 16394