Skip to main content
Erschienen in: Mobile Networks and Applications 6/2021

03.08.2018

A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems

verfasst von: Hanshu Hong, Ximeng Liu, Zhixin Sun

Erschienen in: Mobile Networks and Applications | Ausgabe 6/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Attribute based encryption is suitable for data protection in data outsourcing systems such as cloud computing. However, the leveraging of encryption technique may retrain some routine operations over the encrypted data, particularly in the field of data retrieval. This paper presents an attribute based date retrieval with proxy re-encryption (ABDR-PRE) to provide both fine-grained access control and retrieval over the ciphertexts. The proposed scheme achieves fine-grained data access management by adopting KP-ABE mechanism, a delegator can generate the re-encryption key and search indexes for the ciphertexts to be shared over the target delegatee’s attributes. Throughout the process of data sharing, the data are transferred as ciphers thus the server and unauthorized users cannot acquire the sensitive information of the encrypted data so the privacy and confidentiality can be protected. By security analysis, the proposed scheme meets the security requirements confidentiality, keyword semantic security as well as collusion attack resistance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Li J, Liu Z, Chen X, Tan X, Wong DS (2015) L-EncDB: A Lightweight Framework for Privacy-Preserving Data Queries in Cloud Computing. Knowl-Based Syst 79:18–26CrossRef Li J, Liu Z, Chen X, Tan X, Wong DS (2015) L-EncDB: A Lightweight Framework for Privacy-Preserving Data Queries in Cloud Computing. Knowl-Based Syst 79:18–26CrossRef
2.
Zurück zum Zitat Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the Protection for Data Security under Selective Opening Attacks. Inf Sci 412–413:223–241CrossRef Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the Protection for Data Security under Selective Opening Attacks. Inf Sci 412–413:223–241CrossRef
3.
Zurück zum Zitat Bhuiyan MZA, Wu J, Wang G, Chen Z, Chen J, Wang T (April 2017) Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks. IEEE Transactions on Industrial Informatics 13(2):572–583CrossRef Bhuiyan MZA, Wu J, Wang G, Chen Z, Chen J, Wang T (April 2017) Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks. IEEE Transactions on Industrial Informatics 13(2):572–583CrossRef
4.
Zurück zum Zitat Bhuiyan MZA, Wu J, Wang G, Cao J (2016) Sensing and Decision-making in Cyber-Physical Systems: The Case of Structural Health Monitoring. IEEE Transactions on Industrial Informatics 12(6):2103–2114CrossRef Bhuiyan MZA, Wu J, Wang G, Cao J (2016) Sensing and Decision-making in Cyber-Physical Systems: The Case of Structural Health Monitoring. IEEE Transactions on Industrial Informatics 12(6):2103–2114CrossRef
7.
Zurück zum Zitat Hong H, Sun Z, Liu X (2017) Provably secure attribute based signcryption with delegated computation and efficient key updating. KSII Transactions on Internet and Information Systems 11(5):2646–2659 Hong H, Sun Z, Liu X (2017) Provably secure attribute based signcryption with delegated computation and efficient key updating. KSII Transactions on Internet and Information Systems 11(5):2646–2659
8.
Zurück zum Zitat Liu Z, Huang Y, Li J (2018) DivORAM: Towards a Practical Oblivious RAM with Variable Block Size. Inf Sci 447:1–11CrossRef Liu Z, Huang Y, Li J (2018) DivORAM: Towards a Practical Oblivious RAM with Variable Block Size. Inf Sci 447:1–11CrossRef
9.
Zurück zum Zitat Xu J, Wei L, Yu Z (April 2018) Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures. Volume 107(1):113–124 Xu J, Wei L, Yu Z (April 2018) Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures. Volume 107(1):113–124
10.
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. Advances in Cryptology-EUROCRYPT:457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. Advances in Cryptology-EUROCRYPT:457–473
11.
Zurück zum Zitat Goyal Y, Pandey O, Sahai A, et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications. Security 89-98 Goyal Y, Pandey O, Sahai A, et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications. Security 89-98
12.
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy 2007:321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy 2007:321–334
13.
Zurück zum Zitat Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Public Key Cryptography-PKC 2011:53–70MathSciNetMATH Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Public Key Cryptography-PKC 2011:53–70MathSciNetMATH
14.
Zurück zum Zitat Li LF, Chen XW, Jiang H et al (2016) P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for clouds. 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 575-580 Li LF, Chen XW, Jiang H et al (2016) P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for clouds. 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 575-580
15.
Zurück zum Zitat Reedy BE, Ramu GH (2016) A Secure Framework for Ensuring EHR's Integrity Using Fine-Grained Auditing and CP-ABE. 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS): 85-89 Reedy BE, Ramu GH (2016) A Secure Framework for Ensuring EHR's Integrity Using Fine-Grained Auditing and CP-ABE. 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS): 85-89
16.
Zurück zum Zitat Liu Z, Wong DS (2015) Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe”. Volume 9092 of the series Lecture Notes in Computer Science, Applied Cryptography and Network Security 127-146 Liu Z, Wong DS (2015) Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe”. Volume 9092 of the series Lecture Notes in Computer Science, Applied Cryptography and Network Security 127-146
17.
Zurück zum Zitat Yang K, Jia XH, Ren K et al (2013) DAC-MACS: Effective data access control for multi-authority cloud storage systems. IEEE Transactions on Information Forensics and Security, Information Security 8(11):87–99 Yang K, Jia XH, Ren K et al (2013) DAC-MACS: Effective data access control for multi-authority cloud storage systems. IEEE Transactions on Information Forensics and Security, Information Security 8(11):87–99
18.
Zurück zum Zitat Padhya M, Jinwala D (2014) A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy. Volume 8880 of the series Lecture Notes in Computer Science, Information Systems Security 167-184 Padhya M, Jinwala D (2014) A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy. Volume 8880 of the series Lecture Notes in Computer Science, Information Systems Security 167-184
19.
Zurück zum Zitat Miyaji A, Phuong VX (2012) Constant-ciphertext-size dual policy attribute based encryption. Volume 7672 of the series Lecture Notes in Computer Science, Cyberspace Safety and Security 400-413 Miyaji A, Phuong VX (2012) Constant-ciphertext-size dual policy attribute based encryption. Volume 7672 of the series Lecture Notes in Computer Science, Cyberspace Safety and Security 400-413
20.
Zurück zum Zitat Cheng Y, Wang ZY (2013) Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage. Journal of Zhejiang University SCIENCE C 14(2):85–97CrossRef Cheng Y, Wang ZY (2013) Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage. Journal of Zhejiang University SCIENCE C 14(2):85–97CrossRef
21.
Zurück zum Zitat Qiu S, Liu JQ, Shi YF et al (2017) Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Volume 8880 of the series Lecture Notes in Computer Science. Inf Syst Secur 60:052105 Qiu S, Liu JQ, Shi YF et al (2017) Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Volume 8880 of the series Lecture Notes in Computer Science. Inf Syst Secur 60:052105
22.
Zurück zum Zitat Hong H, Sun Z (2018) Achieving secure data access control and efficient key updating in mobile multimedia sensor networks. Multimedia Tools and Applications 77(4):4477–4490MathSciNetCrossRef Hong H, Sun Z (2018) Achieving secure data access control and efficient key updating in mobile multimedia sensor networks. Multimedia Tools and Applications 77(4):4477–4490MathSciNetCrossRef
23.
Zurück zum Zitat Hong H, Sun Z (2016) High efficient key-insulated attribute based encryption scheme without bilinear pairing operations. Springerplus 5 Hong H, Sun Z (2016) High efficient key-insulated attribute based encryption scheme without bilinear pairing operations. Springerplus 5
Metadaten
Titel
A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems
verfasst von
Hanshu Hong
Ximeng Liu
Zhixin Sun
Publikationsdatum
03.08.2018
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 6/2021
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-018-1102-3

Weitere Artikel der Ausgabe 6/2021

Mobile Networks and Applications 6/2021 Zur Ausgabe