Key Policy-Attribute Based Fully Homomorphic Encryption (KP-ABFHE) Scheme for Securing Cloud Application in Multi-users Environment

被引:1
|
作者
Tan, Soo Fun [1 ]
Samsudin, Azman [1 ]
机构
[1] Univ Sains Malaysia, Sch Comp Sci, George Town 11800, Malaysia
关键词
Cloud computing; Fully homomorphic encryption; Attribute-based encryption; Attribute-based fully homomorphic encryption;
D O I
10.1007/978-981-10-1721-6_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, cloud technologies has become a cost-effective data solution among the small and medium-sized enterprises (SMEs). However, there is a raising concern on its security. This paper proposed the Key Policy-Attribute Based Fully Homomorphic Encryption (KP-ABFHE) scheme for providing an end-to end data protection in multi-users cloud environments. The proposed KP-ABFHE scheme is able to perform the computation while providing fine-grained access on the encrypted data. The proposed scheme is able to handle a monotonic access structure over a set of authorized attributes, without sacrificing the computation capabilities of homomorphic encryption. In addition, this paper proves that the proposed scheme is secure under a selective-set model with the hardness of Decision Ring-LWEd, q,chi problem.
引用
收藏
页码:77 / 86
页数:10
相关论文
共 23 条
  • [1] Multi-user Fully Homomorphic Encryption Scheme Based on Policy for Cloud Computing
    Li, Taoshen
    Liu, Qing
    Huang, Ruwei
    WEB INFORMATION SYSTEMS AND APPLICATIONS (WISA 2021), 2021, 12999 : 274 - 286
  • [2] Ciphertext Policy-Attribute Based Homomorphic Encryption (CP-ABHER-LWE) Scheme: A Fine-Grained Access Control on Outsourced Cloud Data Computation
    Tan, Soo-Fun
    Samsudin, Azman
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 675 - 694
  • [3] A Novel User Revocation Scheme for Key Policy Attribute Based Encryption in Cloud Environments
    Ren, Yifan
    Li, Jie
    Ji, Yusheng
    Das, Sajal K.
    Li, Zhetao
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [4] Fully Secure Unbounded Revocable Key-Policy Attribute-Based Encryption Scheme
    Wang, Changji
    Fang, Jian
    Xie, Jianguo
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 251 - 264
  • [5] Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
    Li R.
    Jia C.
    Wang Y.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 11 - 22
  • [6] Implementing Secure Data Access Control for Multi-authority Cloud Storage System Using Ciphertext Policy-Attribute Based Encryption
    Lekshmi, S. Vijaya
    Revathi, M. P.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [7] An Efficient Attribute-Based Encryption Scheme with Data Security Classification in the Multi-Cloud Environment
    Yang, Guangcan
    Li, Peixuan
    Xiao, Ke
    He, Yunhua
    Xu, Gang
    Wang, Chao
    Chen, Xiubo
    ELECTRONICS, 2023, 12 (20)
  • [8] An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments
    Chandrasekaran, Balaji
    Balakrishnan, Ramadoss
    CRYPTOGRAPHY, 2018, 2 (03) : 1 - 15
  • [9] Power Consumption Data Privacy-preserving Scheme Based on Improved Multi-key Fully Homomorphic Encryption
    Li, Yuancheng
    Yu, Jiawen
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2021, 14 (05) : 564 - 574
  • [10] New directly revocable attribute-based encryption scheme and its application in cloud storage environment
    Wang, Hao
    Zheng, Zhihua
    Wu, Lei
    Li, Ping
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2385 - 2392