COMPUTER SCIENCE AND TECHNOLOGY |
|
|
|
|
|
User privacy-preserving cloud storage scheme on CP-ABE |
CAO Laicheng1, LIU Yufei1, DONG Xiaoye2, GUO Xian1 |
1. School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China;
2. Education Bureau of Zhuanglang County, Zhuanglang 744600, China |
|
|
Abstract A ciphertext-policy attribute based encryption (CP-ABE) user privacy-preserving cloud storage (UPCS) scheme was developed to protect user privacy in cloud storage environments. The data owner sets different access right attributes on different data files. The CP-ABE scheme has the trusted third-party embed the access right attributes into a ciphertext wich can be decrypted only when the user's attributes satisfy the access attributes of the ciphertext. The computational times of the data owner and users are reduced by authorizing some data owner and user operations to a distributed proxy server. Tests show that this scheme can effectively guarantee the user data and keyword privacy and reduce the data owner and user computational times.
|
Keywords
searchable encryption
distributed proxy server
attribute based encryption
privacy-preserving
cloud storage
|
|
Issue Date: 15 February 2018
|
|
|
[1] |
FU Z J, REN K, SHU J G, et al. Enabling personalized search over encrypted outsourced data with efficiency improvement[J]. IEEE Transactions on Parallel and Distributed Systems, 2017, 27(9):2546-2559.
|
[2] |
HUANG J Y. Patent portfolio analysis of the cloud computing industry[J]. Journal of Engineering and Technology Management, 2016, 39:45-64.
url: http://dx.doi.org/10.1016/j.jengtecman.2016.01.002
|
[3] |
崔勇, 宋健, 缪葱葱, 等. 移动云计算研究进展与趋势[J]. 计算机学报, 2017, 40(2):273-295. CUI Y, SONG J, MIAO C C, et al. Mobile cloud computing research progress and trends[J]. Chinese Journal of Computers, 2017, 40(2):273-295. (in Chinese)
|
[4] |
CHANG V, RAMACHANDRAN M. Towards achieving data security with the cloud computing adoption framework[J]. IEEE Transactions on Services Computing, 2016, 9(1):138-151.
|
[5] |
杨旸, 杨书略, 柯闽. 加密云数据下基于Simhash的模糊排序搜索方案[J]. 计算机学报, 2017, 40(2):431-444. YANG Y, YANG S L, KE M. Ranked fuzzy keyword search based on Simhash over encrypted cloud data[J]. Chinese Journal of Computers, 2017, 40(2):431-444. (in Chinese)
|
[6] |
CAO L C, HE W W, GUO X, et al. A scheme for verification on data integrity in mobile multicloud computing environment[J]. Mathematical Problems in Engineering, 2016, 2016:9267608.
|
[7] |
PITCHAI R, JAYASHRI S, RAJA J. Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing[J]. Wireless Personal Communications, 2016, 90(2):947-960.
|
[8] |
CHEN R M, MU Y, YANG G M, et al. Server-aided public key encryption with keyword search[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12):2833-2842.
|
[9] |
CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption:Improved definitions and efficient constructions[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York, USA:Association for Computing Machinery, 2006:79-88.
|
[10] |
BAO F, DENG R H, DING X H, et al. Private query on encrypted data in multi-user settings[C]//Proceedings of the 4th International Conference on Information Security Practice and Experience. Sydney, Australia:Springer Verlag, 2008:71-85.
|
[11] |
LIU Q, TAN C C, WU J, et al. Cooperative private searching in clouds[J]. Journal of Parallel and Distributed Computing, 2012, 72(8):1019-1031.
|
[12] |
SOOKHAK M, YU F R, KHAN M K, et al. Attribute-based data access control in mobile cloud computing:Taxonomy and open issues[J]. Future Generation Computer Systems, 2017, 72:273-287.
url: http://dx.doi.org/10.1016/j.future.2016.08.018
|
[13] |
RIAL A. Blind attribute-based encryption and oblivious transfer with fine-grained access control[J]. Designs, Codes and Cryptography, 2016, 81(2):179-223.
|
[14] |
王光波, 王建华. 基于属性加密的云存储方案研究[J]. 电子与信息学报, 2016, 38(11):2931-2939. WANG G B, WANG J H. Research on cloud storage scheme with attribute-based encryption[J]. Journal of Electronics & Information Technology, 2016, 38(11):2931-2939. (in Chinese)
url: http://dx.doi.org/al of Electronics
|
[15] |
SUN W H, YU S C, LOU W J, et al. Protecting your right:Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(4):1187-1198.
|
[16] |
WANG S P, ZHANG X X, ZHANG Y L. Efficiently multi-user searchable encryption scheme with attribute revocation and grant for cloud storage[J]. PLoS One, 2016, 11(11):e0167157.
|
[17] |
CHENG M. The pairing-based cryptography library[CP/OL].[2017-08-10]. https://crypto.stanford.edu/pbc/download.html.
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|