Skip to main content
Top
Published in: Soft Computing 8/2019

28-01-2019 | Focus

Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm

Authors: R. Naresh, M. Sayeekumar, G. M. Karthick, P. Supraja

Published in: Soft Computing | Issue 8/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

File storing as well as retrieving is the most important security-related research area in cloud. Based on our literature survey, many researchers have developed several searchable encryption protocols. Among the several protocols, only minimum number of protocols satisfies the efficient file retrieval from the cloud. Previous research papers support the file encryption based on the keyword, secret key and random number. But in this research paper, we have proposed attribute-based encryption based on the hierarchical manner. The collections of files are encrypted under one common access layer. Compared to earlier researches, our attribute-based hierarchical file encryption scheme supports very less computation as well as storage complexity. We have constructed a new index model named data vector (DV) tree using crossover genetic algorithm which is a component of the soft computing. The DV tree is built based on the term frequency, inverse document frequency and attributes of the file. We have also developed a new key generation, encryption and decryption function for efficient retrieval of files towards the data users.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: IEEE symposium on security and privacy, pp 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: IEEE symposium on security and privacy, pp 321–334
go back to reference Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25:222–233CrossRef Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25:222–233CrossRef
go back to reference Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z, Zomaya A (2016) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst 27:951–963CrossRef Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z, Zomaya A (2016) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst 27:951–963CrossRef
go back to reference Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM conference on computer and communications security, pp 79–88 Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM conference on computer and communications security, pp 79–88
go back to reference Dan B, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp 535–554 Dan B, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp 535–554
go back to reference Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 275:370–384MathSciNetCrossRefMATH Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 275:370–384MathSciNetCrossRefMATH
go back to reference Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27:2546–2559CrossRef Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27:2546–2559CrossRef
go back to reference Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. Lect Notes Comput Sci 3089:31–45CrossRefMATH Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. Lect Notes Comput Sci 3089:31–45CrossRefMATH
go back to reference Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. DBLP Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. DBLP
go back to reference Guo F, Mu Y, Susilo W, Wong DS (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf Forensics Secur 9:763–771CrossRef Guo F, Mu Y, Susilo W, Wong DS (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf Forensics Secur 9:763–771CrossRef
go back to reference Hur J, Dong KN (2010) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221CrossRef Hur J, Dong KN (2010) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221CrossRef
go back to reference Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: International conference on theory and applications of cryptographic techniques, pp 62–91 Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: International conference on theory and applications of cryptographic techniques, pp 62–91
go back to reference Li J, Shi Y, Zhang Y (2017a) Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int J Commun Syst 30(1):e2942CrossRef Li J, Shi Y, Zhang Y (2017a) Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int J Commun Syst 30(1):e2942CrossRef
go back to reference Li J, Yao W, Zhang Y, Qian H, Han J (2017b) Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans Serv Comput 10(5):785–796CrossRef Li J, Yao W, Zhang Y, Qian H, Han J (2017b) Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans Serv Comput 10(5):785–796CrossRef
go back to reference Li J, Lin X, Zhang Y, Han J (2017d) KSF-OABE: outsourced attribute based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715–725CrossRef Li J, Lin X, Zhang Y, Han J (2017d) KSF-OABE: outsourced attribute based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715–725CrossRef
go back to reference Li J, Yao W, Han J, Zhang Y, Shen J (2018) User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Systems J 12(2):1767–1777CrossRef Li J, Yao W, Han J, Zhang Y, Shen J (2018) User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Systems J 12(2):1767–1777CrossRef
go back to reference Liang K, Man HA, Liu JK, Susilo W, Wong DS, Yang G, Yu Y, Yang A (2015) A secure and efficient ciphertext-policy attribute based proxy re-encryption for cloud data sharing. Future Gener Comput Syst 52:95–108CrossRef Liang K, Man HA, Liu JK, Susilo W, Wong DS, Yang G, Yu Y, Yang A (2015) A secure and efficient ciphertext-policy attribute based proxy re-encryption for cloud data sharing. Future Gener Comput Syst 52:95–108CrossRef
go back to reference Luo E, Liu Q, Wang G (2016) Hierarchical multi-authority and attribute based encryption friend discovery scheme in mobile social networks. IEEE Commun Lett 20:1772–1775CrossRef Luo E, Liu Q, Wang G (2016) Hierarchical multi-authority and attribute based encryption friend discovery scheme in mobile social networks. IEEE Commun Lett 20:1772–1775CrossRef
go back to reference Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2017a) Attribute based keyword search over hierarchical data in cloud computing. IEEE Trans Serv Comput PP(99):1 Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2017a) Attribute based keyword search over hierarchical data in cloud computing. IEEE Trans Serv Comput PP(99):1
go back to reference Miao Y, Ma J, Liu X, Li X, Liu Z, Li H (2017b) Practical attribute based multi-keyword search scheme in mobile crowdsourcing. IEEE Internet Things J PP(99):1 Miao Y, Ma J, Liu X, Li X, Liu Z, Li H (2017b) Practical attribute based multi-keyword search scheme in mobile crowdsourcing. IEEE Internet Things J PP(99):1
go back to reference Miao Y, Ma J, Liu X, Jiang Q, Zhang J, Shen L, Liu Z (2017c) VCKSM: verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings. Pervasive Mob Comput 40:205–219CrossRef Miao Y, Ma J, Liu X, Jiang Q, Zhang J, Shen L, Liu Z (2017c) VCKSM: verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings. Pervasive Mob Comput 40:205–219CrossRef
go back to reference Pandiaraja P, Vijayakumar P, Vijayakumar V, Seshadhri R (2017) Computation efficient attribute based broadcast group key management for secure document access in public cloud. J Inf Sci Eng 33(3):695–712MathSciNet Pandiaraja P, Vijayakumar P, Vijayakumar V, Seshadhri R (2017) Computation efficient attribute based broadcast group key management for secure document access in public cloud. J Inf Sci Eng 33(3):695–712MathSciNet
go back to reference Qian H, Li J, Zhang Y, Han J (2015) Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int J Inf Secur 14(6):487–497CrossRef Qian H, Li J, Zhang Y, Han J (2015) Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int J Inf Secur 14(6):487–497CrossRef
go back to reference Rao YS (2017) A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener Comput Syst 67:133–151CrossRef Rao YS (2017) A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener Comput Syst 67:133–151CrossRef
go back to reference Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16:69–73CrossRef Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16:69–73CrossRef
go back to reference Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: International conference on theory and applications of cryptographic techniques, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: International conference on theory and applications of cryptographic techniques, pp 457–473
go back to reference Song DX, Wagner D, Perrig A (2002) Practical techniques for searches on encrypted data. In: 2000 IEEE symposium on security and privacy, 2000. S&P 2000. Proceedings, pp 1–44 Song DX, Wagner D, Perrig A (2002) Practical techniques for searches on encrypted data. In: 2000 IEEE symposium on security and privacy, 2000. S&P 2000. Proceedings, pp 1–44
go back to reference Supraja P, Jayashri S (2017) Optimized neural network for spectrum prediction scheme in cognitive radio. Wireless Pers Commun 94(4):2597–2611CrossRef Supraja P, Jayashri S (2017) Optimized neural network for spectrum prediction scheme in cognitive radio. Wireless Pers Commun 94(4):2597–2611CrossRef
go back to reference Swaminathan A, Mao Y, Su GM, Gou H, Varna AL, He S, Wu M, Oard DW (2007) Confidentiality-preserving rank-ordered search. ACM workshop on storage security and survivability, storages 2007, Alexandria, VA, USA, October, pp 7–12 Swaminathan A, Mao Y, Su GM, Gou H, Varna AL, He S, Wu M, Oard DW (2007) Confidentiality-preserving rank-ordered search. ACM workshop on storage security and survivability, storages 2007, Alexandria, VA, USA, October, pp 7–12
go back to reference Vijayakumar P, Naresh R, Deborah LJ, Islam SKH (2016a) An efficient group key agreement protocol for secure peer to peer communication. Secur Commun Netw 9(17):3952–3965CrossRef Vijayakumar P, Naresh R, Deborah LJ, Islam SKH (2016a) An efficient group key agreement protocol for secure peer to peer communication. Secur Commun Netw 9(17):3952–3965CrossRef
go back to reference Vijayakumar P, Naresh R, Islam SKH, Deborah LJ (2016b) An effective key distribution for secure internet pay-TV using access key hierarchies. Secur Commun Netw 9(18):5085–5097CrossRef Vijayakumar P, Naresh R, Islam SKH, Deborah LJ (2016b) An effective key distribution for secure internet pay-TV using access key hierarchies. Secur Commun Netw 9(18):5085–5097CrossRef
go back to reference Vijayakumar P, Pandiaraja P, Karuppiah M, Deborah LJ (2017) An efficient secure communication for healthcare system using wearable devices. Comput Electr Eng 63:232–245CrossRef Vijayakumar P, Pandiaraja P, Karuppiah M, Deborah LJ (2017) An efficient secure communication for healthcare system using wearable devices. Comput Electr Eng 63:232–245CrossRef
go back to reference Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7:743–754CrossRef Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7:743–754CrossRef
go back to reference Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: ACM conference on computer and communications security, pp 735–737 Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: ACM conference on computer and communications security, pp 735–737
go back to reference Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23:1467–1479CrossRef Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23:1467–1479CrossRef
go back to reference Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277CrossRef Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277CrossRef
go back to reference Wang N, Fu J, Bhargava BK, Zeng J (2018) Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans Inf Forensics Secur 13(10):2653–2667CrossRef Wang N, Fu J, Bhargava BK, Zeng J (2018) Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans Inf Forensics Secur 13(10):2653–2667CrossRef
go back to reference Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27:340–352CrossRef Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27:340–352CrossRef
go back to reference Yang Y, Liu JK, Liang K, Choo KKR, Zhou J (2015) Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data, vol 9327. Springer International Publishing Yang Y, Liu JK, Liang K, Choo KKR, Zhou J (2015) Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data, vol 9327. Springer International Publishing
go back to reference Zerr S, Olmedilla D, Nejdl W, Siberski W (2009) Zerber+r : topk retrieval from a confidential index. In International conference on extending database technology: advances in database technology, pp 439–449 Zerr S, Olmedilla D, Nejdl W, Siberski W (2009) Zerber+r : topk retrieval from a confidential index. In International conference on extending database technology: advances in database technology, pp 439–449
Metadata
Title
Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm
Authors
R. Naresh
M. Sayeekumar
G. M. Karthick
P. Supraja
Publication date
28-01-2019
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 8/2019
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-03790-1

Other articles of this Issue 8/2019

Soft Computing 8/2019 Go to the issue

Premium Partner