Skip to main content
Erschienen in: The Journal of Supercomputing 8/2020

02.01.2020

An attribute-based lightweight cloud data access control using hypergraph structure

verfasst von: R. Mythili, Revathi Venkataraman, T. Sai Raj

Erschienen in: The Journal of Supercomputing | Ausgabe 8/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud file storage systems are the current trend of enterprises and also of individual users. Due to the malicious or unauthorized users, file sharing among the cloud users has become the biggest challenge in the recent times. Attribute-based signcryption (ABSC) is known as the versatile cryptographic primitive which achieves the fine-grained access control over robust cloud storage. ABSC combines attribute-based encryption (ABE) and attribute-based signatures to achieve privacy-oriented confidentiality along with the authenticity. Unfortunately, most of the present ABE and ABSC schemes leverage heavy computational overheads against the key length, the ciphertext size or the expressive access structures used. In this paper, a new ABSC scheme is devised to reduce computational overheads, more particularly, at cloud by introducing the more expressive hypergraph access structure, Attribute HyperGraph. On a positive note, the proposed system outperforms and shows less cloud computational timing without exponentiations unlike Deng et al. (IEEE Access 6:39473–39486, 2018. https://​doi.​org/​10.​1109/​ACCESS.​2018.​2843778), Liu et al. (Future Gener Comput Syst 52:67–76, 2015. https://​doi.​org/​10.​1016/​j.​future.​2014.​10.​014) and Li et al. (IEEE Trans Parallel Distrib Syst 25(8):2201–2210, 2014. https://​doi.​org/​10.​1109/​TPDS.​2013.​271) schemes. Subsequently, the system does not incur any cryptographic computations associated with designcryption at cloud unlike Deng et al. (2018).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology—EUROCRYPT 2005. Springer, Berlin, pp 457–473. ISBN 978-3-540-32055-5 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology—EUROCRYPT 2005. Springer, Berlin, pp 457–473. ISBN 978-3-540-32055-5
2.
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS’06, New York, NY, USA, 2006. ACM, pp 89–98. ISBN 1-59593-518-5. https://doi.org/10.1145/1180405.1180418 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS’06, New York, NY, USA, 2006. ACM, pp 89–98. ISBN 1-59593-518-5. https://​doi.​org/​10.​1145/​1180405.​1180418
4.
Zurück zum Zitat Chase M (2007) Multi-authority attribute-based encryption. In: Theory of Cryptography. Springer, Berlin, pp 515–534. ISBN 978-3-540-70936-7 Chase M (2007) Multi-authority attribute-based encryption. In: Theory of Cryptography. Springer, Berlin, pp 515–534. ISBN 978-3-540-70936-7
6.
Zurück zum Zitat Attrapadung N, Imai H (2009) Conjunctive broadcast and attribute-based encryption. In: Shacham H, Waters B (eds) Pairing-Based Cryptography—Pairing 2009. Springer, Berlin, pp 248–265. ISBN 978-3-642-03298-1 Attrapadung N, Imai H (2009) Conjunctive broadcast and attribute-based encryption. In: Shacham H, Waters B (eds) Pairing-Based Cryptography—Pairing 2009. Springer, Berlin, pp 248–265. ISBN 978-3-642-03298-1
7.
Zurück zum Zitat Pandit T, Pandey SK, Barua R (2014) Attribute-based signcryption: signer privacy, strong unforgeability and IND-CCA2 security in adaptive-predicates attack. In: Chow SSM, Liu JK, Hui LCK, Yiu SM (eds) Provable Security. Springer International Publishing, Cham, pp 274–290. ISBN 978-3-319-12475-9 Pandit T, Pandey SK, Barua R (2014) Attribute-based signcryption: signer privacy, strong unforgeability and IND-CCA2 security in adaptive-predicates attack. In: Chow SSM, Liu JK, Hui LCK, Yiu SM (eds) Provable Security. Springer International Publishing, Cham, pp 274–290. ISBN 978-3-319-12475-9
9.
Zurück zum Zitat Zhang Y, Zheng D (2017) Anonymous attribute-based encryption with large universe and threshold access structures. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol 1, pp 870–874. https://doi.org/10.1109/cse-euc.2017.175 Zhang Y, Zheng D (2017) Anonymous attribute-based encryption with large universe and threshold access structures. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol 1, pp 870–874. https://​doi.​org/​10.​1109/​cse-euc.​2017.​175
14.
17.
Zurück zum Zitat Debnath S, Nunsanga MVL, Bhuyan B (2019) Study and scope of signcryption for cloud data access control. In: Advances in computer, communication and control. Springer Singapore, pp 113–126. ISBN 978-981-13-3122-0 Debnath S, Nunsanga MVL, Bhuyan B (2019) Study and scope of signcryption for cloud data access control. In: Advances in computer, communication and control. Springer Singapore, pp 113–126. ISBN 978-981-13-3122-0
19.
Zurück zum Zitat Li Q, Zhu H (2017) Multi-authority attribute-based access control scheme in mhealth cloud with unbounded attribute universe and decryption outsourcing. In: 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), pp 1–7. https://doi.org/10.1109/wcsp.2017.8171106 Li Q, Zhu H (2017) Multi-authority attribute-based access control scheme in mhealth cloud with unbounded attribute universe and decryption outsourcing. In: 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), pp 1–7. https://​doi.​org/​10.​1109/​wcsp.​2017.​8171106
20.
Zurück zum Zitat Yundong F, Xiaoping W, Jiasheng W (2017) Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp 205–212. https://doi.org/10.1109/dsc.2017.10 Yundong F, Xiaoping W, Jiasheng W (2017) Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp 205–212. https://​doi.​org/​10.​1109/​dsc.​2017.​10
Metadaten
Titel
An attribute-based lightweight cloud data access control using hypergraph structure
verfasst von
R. Mythili
Revathi Venkataraman
T. Sai Raj
Publikationsdatum
02.01.2020
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 8/2020
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-019-03119-7

Weitere Artikel der Ausgabe 8/2020

The Journal of Supercomputing 8/2020 Zur Ausgabe