Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2018, Vol. 58 Issue (2) : 150-156     DOI: 10.16511/j.cnki.qhdxxb.2018.26.006
COMPUTER SCIENCE AND TECHNOLOGY |
User privacy-preserving cloud storage scheme on CP-ABE
CAO Laicheng1, LIU Yufei1, DONG Xiaoye2, GUO Xian1
1. School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China;
2. Education Bureau of Zhuanglang County, Zhuanglang 744600, China
Download: PDF(1351 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  A ciphertext-policy attribute based encryption (CP-ABE) user privacy-preserving cloud storage (UPCS) scheme was developed to protect user privacy in cloud storage environments. The data owner sets different access right attributes on different data files. The CP-ABE scheme has the trusted third-party embed the access right attributes into a ciphertext wich can be decrypted only when the user's attributes satisfy the access attributes of the ciphertext. The computational times of the data owner and users are reduced by authorizing some data owner and user operations to a distributed proxy server. Tests show that this scheme can effectively guarantee the user data and keyword privacy and reduce the data owner and user computational times.
Keywords searchable encryption      distributed proxy server      attribute based encryption      privacy-preserving      cloud storage     
ZTFLH:  TP309.2  
Issue Date: 15 February 2018
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
CAO Laicheng
LIU Yufei
DONG Xiaoye
GUO Xian
Cite this article:   
CAO Laicheng,LIU Yufei,DONG Xiaoye, et al. User privacy-preserving cloud storage scheme on CP-ABE[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(2): 150-156.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2018.26.006     OR     http://jst.tsinghuajournals.com/EN/Y2018/V58/I2/150
  
  
  
  
  
  
  
[1] FU Z J, REN K, SHU J G, et al. Enabling personalized search over encrypted outsourced data with efficiency improvement[J]. IEEE Transactions on Parallel and Distributed Systems, 2017, 27(9):2546-2559.
[2] HUANG J Y. Patent portfolio analysis of the cloud computing industry[J]. Journal of Engineering and Technology Management, 2016, 39:45-64.
url: http://dx.doi.org/10.1016/j.jengtecman.2016.01.002
[3] 崔勇, 宋健, 缪葱葱, 等. 移动云计算研究进展与趋势[J]. 计算机学报, 2017, 40(2):273-295. CUI Y, SONG J, MIAO C C, et al. Mobile cloud computing research progress and trends[J]. Chinese Journal of Computers, 2017, 40(2):273-295. (in Chinese)
[4] CHANG V, RAMACHANDRAN M. Towards achieving data security with the cloud computing adoption framework[J]. IEEE Transactions on Services Computing, 2016, 9(1):138-151.
[5] 杨旸, 杨书略, 柯闽. 加密云数据下基于Simhash的模糊排序搜索方案[J]. 计算机学报, 2017, 40(2):431-444. YANG Y, YANG S L, KE M. Ranked fuzzy keyword search based on Simhash over encrypted cloud data[J]. Chinese Journal of Computers, 2017, 40(2):431-444. (in Chinese)
[6] CAO L C, HE W W, GUO X, et al. A scheme for verification on data integrity in mobile multicloud computing environment[J]. Mathematical Problems in Engineering, 2016, 2016:9267608.
[7] PITCHAI R, JAYASHRI S, RAJA J. Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing[J]. Wireless Personal Communications, 2016, 90(2):947-960.
[8] CHEN R M, MU Y, YANG G M, et al. Server-aided public key encryption with keyword search[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12):2833-2842.
[9] CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption:Improved definitions and efficient constructions[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York, USA:Association for Computing Machinery, 2006:79-88.
[10] BAO F, DENG R H, DING X H, et al. Private query on encrypted data in multi-user settings[C]//Proceedings of the 4th International Conference on Information Security Practice and Experience. Sydney, Australia:Springer Verlag, 2008:71-85.
[11] LIU Q, TAN C C, WU J, et al. Cooperative private searching in clouds[J]. Journal of Parallel and Distributed Computing, 2012, 72(8):1019-1031.
[12] SOOKHAK M, YU F R, KHAN M K, et al. Attribute-based data access control in mobile cloud computing:Taxonomy and open issues[J]. Future Generation Computer Systems, 2017, 72:273-287.
url: http://dx.doi.org/10.1016/j.future.2016.08.018
[13] RIAL A. Blind attribute-based encryption and oblivious transfer with fine-grained access control[J]. Designs, Codes and Cryptography, 2016, 81(2):179-223.
[14] 王光波, 王建华. 基于属性加密的云存储方案研究[J]. 电子与信息学报, 2016, 38(11):2931-2939. WANG G B, WANG J H. Research on cloud storage scheme with attribute-based encryption[J]. Journal of Electronics & Information Technology, 2016, 38(11):2931-2939. (in Chinese)
url: http://dx.doi.org/al of Electronics
[15] SUN W H, YU S C, LOU W J, et al. Protecting your right:Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(4):1187-1198.
[16] WANG S P, ZHANG X X, ZHANG Y L. Efficiently multi-user searchable encryption scheme with attribute revocation and grant for cloud storage[J]. PLoS One, 2016, 11(11):e0167157.
[17] CHENG M. The pairing-based cryptography library[CP/OL].[2017-08-10]. https://crypto.stanford.edu/pbc/download.html.
[1] CAO Laicheng, WU Qirui, WANG Yafei, WU Rong, GUO Xian. Efficient semantic-based multiuser search scheme[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(11): 1228-1233.
[2] JIA Chunfu, WANG Yafei, CHEN Yang, SUN Mengjie, GE Fengyi. Machine learning algorithm for a homomorphic encrypted data set[J]. Journal of Tsinghua University(Science and Technology), 2020, 60(6): 456-463.
[3] CAO Laicheng, HE Wenwen, LIU Yufei, GUO Xian, FENG Tao. Cooperative dynamic data possession scheme across a cloud storage environment[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(10): 1048-1055.
[4] LI Yong, YAO Ge, LEI Linan, ZHANG Xiaofei, YANG Kun. LBT-based cloud data integrity verification scheme[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(5): 504-510.
[5] WANG Weiping, ZHANG Junfeng, WANG Jianxin. Data integrity check based on null space for network coding based cloud storage[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(1): 83-88,96.
[6] Dongri YANG, Ying WANG, Peng LIU. Fault-tolerant mechanism combined with replication and error correcting code for cloud file systems[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(1): 137-144.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd