Skip to main content
Erschienen in: Soft Computing 8/2019

28.01.2019 | Focus

Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm

verfasst von: R. Naresh, M. Sayeekumar, G. M. Karthick, P. Supraja

Erschienen in: Soft Computing | Ausgabe 8/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

File storing as well as retrieving is the most important security-related research area in cloud. Based on our literature survey, many researchers have developed several searchable encryption protocols. Among the several protocols, only minimum number of protocols satisfies the efficient file retrieval from the cloud. Previous research papers support the file encryption based on the keyword, secret key and random number. But in this research paper, we have proposed attribute-based encryption based on the hierarchical manner. The collections of files are encrypted under one common access layer. Compared to earlier researches, our attribute-based hierarchical file encryption scheme supports very less computation as well as storage complexity. We have constructed a new index model named data vector (DV) tree using crossover genetic algorithm which is a component of the soft computing. The DV tree is built based on the term frequency, inverse document frequency and attributes of the file. We have also developed a new key generation, encryption and decryption function for efficient retrieval of files towards the data users.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: IEEE symposium on security and privacy, pp 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: IEEE symposium on security and privacy, pp 321–334
Zurück zum Zitat Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25:222–233CrossRef Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25:222–233CrossRef
Zurück zum Zitat Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z, Zomaya A (2016) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst 27:951–963CrossRef Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z, Zomaya A (2016) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst 27:951–963CrossRef
Zurück zum Zitat Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM conference on computer and communications security, pp 79–88 Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM conference on computer and communications security, pp 79–88
Zurück zum Zitat Dan B, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp 535–554 Dan B, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp 535–554
Zurück zum Zitat Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 275:370–384MathSciNetCrossRefMATH Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 275:370–384MathSciNetCrossRefMATH
Zurück zum Zitat Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27:2546–2559CrossRef Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27:2546–2559CrossRef
Zurück zum Zitat Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. Lect Notes Comput Sci 3089:31–45CrossRefMATH Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. Lect Notes Comput Sci 3089:31–45CrossRefMATH
Zurück zum Zitat Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. DBLP Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. DBLP
Zurück zum Zitat Guo F, Mu Y, Susilo W, Wong DS (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf Forensics Secur 9:763–771CrossRef Guo F, Mu Y, Susilo W, Wong DS (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf Forensics Secur 9:763–771CrossRef
Zurück zum Zitat Hur J, Dong KN (2010) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221CrossRef Hur J, Dong KN (2010) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221CrossRef
Zurück zum Zitat Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: International conference on theory and applications of cryptographic techniques, pp 62–91 Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: International conference on theory and applications of cryptographic techniques, pp 62–91
Zurück zum Zitat Li J, Shi Y, Zhang Y (2017a) Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int J Commun Syst 30(1):e2942CrossRef Li J, Shi Y, Zhang Y (2017a) Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int J Commun Syst 30(1):e2942CrossRef
Zurück zum Zitat Li J, Yao W, Zhang Y, Qian H, Han J (2017b) Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans Serv Comput 10(5):785–796CrossRef Li J, Yao W, Zhang Y, Qian H, Han J (2017b) Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans Serv Comput 10(5):785–796CrossRef
Zurück zum Zitat Li J, Lin X, Zhang Y, Han J (2017d) KSF-OABE: outsourced attribute based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715–725CrossRef Li J, Lin X, Zhang Y, Han J (2017d) KSF-OABE: outsourced attribute based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715–725CrossRef
Zurück zum Zitat Li J, Yao W, Han J, Zhang Y, Shen J (2018) User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Systems J 12(2):1767–1777CrossRef Li J, Yao W, Han J, Zhang Y, Shen J (2018) User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Systems J 12(2):1767–1777CrossRef
Zurück zum Zitat Liang K, Man HA, Liu JK, Susilo W, Wong DS, Yang G, Yu Y, Yang A (2015) A secure and efficient ciphertext-policy attribute based proxy re-encryption for cloud data sharing. Future Gener Comput Syst 52:95–108CrossRef Liang K, Man HA, Liu JK, Susilo W, Wong DS, Yang G, Yu Y, Yang A (2015) A secure and efficient ciphertext-policy attribute based proxy re-encryption for cloud data sharing. Future Gener Comput Syst 52:95–108CrossRef
Zurück zum Zitat Luo E, Liu Q, Wang G (2016) Hierarchical multi-authority and attribute based encryption friend discovery scheme in mobile social networks. IEEE Commun Lett 20:1772–1775CrossRef Luo E, Liu Q, Wang G (2016) Hierarchical multi-authority and attribute based encryption friend discovery scheme in mobile social networks. IEEE Commun Lett 20:1772–1775CrossRef
Zurück zum Zitat Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2017a) Attribute based keyword search over hierarchical data in cloud computing. IEEE Trans Serv Comput PP(99):1 Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2017a) Attribute based keyword search over hierarchical data in cloud computing. IEEE Trans Serv Comput PP(99):1
Zurück zum Zitat Miao Y, Ma J, Liu X, Li X, Liu Z, Li H (2017b) Practical attribute based multi-keyword search scheme in mobile crowdsourcing. IEEE Internet Things J PP(99):1 Miao Y, Ma J, Liu X, Li X, Liu Z, Li H (2017b) Practical attribute based multi-keyword search scheme in mobile crowdsourcing. IEEE Internet Things J PP(99):1
Zurück zum Zitat Miao Y, Ma J, Liu X, Jiang Q, Zhang J, Shen L, Liu Z (2017c) VCKSM: verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings. Pervasive Mob Comput 40:205–219CrossRef Miao Y, Ma J, Liu X, Jiang Q, Zhang J, Shen L, Liu Z (2017c) VCKSM: verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings. Pervasive Mob Comput 40:205–219CrossRef
Zurück zum Zitat Pandiaraja P, Vijayakumar P, Vijayakumar V, Seshadhri R (2017) Computation efficient attribute based broadcast group key management for secure document access in public cloud. J Inf Sci Eng 33(3):695–712MathSciNet Pandiaraja P, Vijayakumar P, Vijayakumar V, Seshadhri R (2017) Computation efficient attribute based broadcast group key management for secure document access in public cloud. J Inf Sci Eng 33(3):695–712MathSciNet
Zurück zum Zitat Qian H, Li J, Zhang Y, Han J (2015) Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int J Inf Secur 14(6):487–497CrossRef Qian H, Li J, Zhang Y, Han J (2015) Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int J Inf Secur 14(6):487–497CrossRef
Zurück zum Zitat Rao YS (2017) A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener Comput Syst 67:133–151CrossRef Rao YS (2017) A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener Comput Syst 67:133–151CrossRef
Zurück zum Zitat Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16:69–73CrossRef Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16:69–73CrossRef
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: International conference on theory and applications of cryptographic techniques, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: International conference on theory and applications of cryptographic techniques, pp 457–473
Zurück zum Zitat Song DX, Wagner D, Perrig A (2002) Practical techniques for searches on encrypted data. In: 2000 IEEE symposium on security and privacy, 2000. S&P 2000. Proceedings, pp 1–44 Song DX, Wagner D, Perrig A (2002) Practical techniques for searches on encrypted data. In: 2000 IEEE symposium on security and privacy, 2000. S&P 2000. Proceedings, pp 1–44
Zurück zum Zitat Supraja P, Jayashri S (2017) Optimized neural network for spectrum prediction scheme in cognitive radio. Wireless Pers Commun 94(4):2597–2611CrossRef Supraja P, Jayashri S (2017) Optimized neural network for spectrum prediction scheme in cognitive radio. Wireless Pers Commun 94(4):2597–2611CrossRef
Zurück zum Zitat Swaminathan A, Mao Y, Su GM, Gou H, Varna AL, He S, Wu M, Oard DW (2007) Confidentiality-preserving rank-ordered search. ACM workshop on storage security and survivability, storages 2007, Alexandria, VA, USA, October, pp 7–12 Swaminathan A, Mao Y, Su GM, Gou H, Varna AL, He S, Wu M, Oard DW (2007) Confidentiality-preserving rank-ordered search. ACM workshop on storage security and survivability, storages 2007, Alexandria, VA, USA, October, pp 7–12
Zurück zum Zitat Vijayakumar P, Naresh R, Deborah LJ, Islam SKH (2016a) An efficient group key agreement protocol for secure peer to peer communication. Secur Commun Netw 9(17):3952–3965CrossRef Vijayakumar P, Naresh R, Deborah LJ, Islam SKH (2016a) An efficient group key agreement protocol for secure peer to peer communication. Secur Commun Netw 9(17):3952–3965CrossRef
Zurück zum Zitat Vijayakumar P, Naresh R, Islam SKH, Deborah LJ (2016b) An effective key distribution for secure internet pay-TV using access key hierarchies. Secur Commun Netw 9(18):5085–5097CrossRef Vijayakumar P, Naresh R, Islam SKH, Deborah LJ (2016b) An effective key distribution for secure internet pay-TV using access key hierarchies. Secur Commun Netw 9(18):5085–5097CrossRef
Zurück zum Zitat Vijayakumar P, Pandiaraja P, Karuppiah M, Deborah LJ (2017) An efficient secure communication for healthcare system using wearable devices. Comput Electr Eng 63:232–245CrossRef Vijayakumar P, Pandiaraja P, Karuppiah M, Deborah LJ (2017) An efficient secure communication for healthcare system using wearable devices. Comput Electr Eng 63:232–245CrossRef
Zurück zum Zitat Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7:743–754CrossRef Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7:743–754CrossRef
Zurück zum Zitat Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: ACM conference on computer and communications security, pp 735–737 Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: ACM conference on computer and communications security, pp 735–737
Zurück zum Zitat Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23:1467–1479CrossRef Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23:1467–1479CrossRef
Zurück zum Zitat Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277CrossRef Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277CrossRef
Zurück zum Zitat Wang N, Fu J, Bhargava BK, Zeng J (2018) Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans Inf Forensics Secur 13(10):2653–2667CrossRef Wang N, Fu J, Bhargava BK, Zeng J (2018) Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans Inf Forensics Secur 13(10):2653–2667CrossRef
Zurück zum Zitat Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27:340–352CrossRef Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27:340–352CrossRef
Zurück zum Zitat Yang Y, Liu JK, Liang K, Choo KKR, Zhou J (2015) Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data, vol 9327. Springer International Publishing Yang Y, Liu JK, Liang K, Choo KKR, Zhou J (2015) Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data, vol 9327. Springer International Publishing
Zurück zum Zitat Zerr S, Olmedilla D, Nejdl W, Siberski W (2009) Zerber+r : topk retrieval from a confidential index. In International conference on extending database technology: advances in database technology, pp 439–449 Zerr S, Olmedilla D, Nejdl W, Siberski W (2009) Zerber+r : topk retrieval from a confidential index. In International conference on extending database technology: advances in database technology, pp 439–449
Metadaten
Titel
Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm
verfasst von
R. Naresh
M. Sayeekumar
G. M. Karthick
P. Supraja
Publikationsdatum
28.01.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 8/2019
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-03790-1

Weitere Artikel der Ausgabe 8/2019

Soft Computing 8/2019 Zur Ausgabe

Premium Partner