Skip to main content
Erschienen in: Service Oriented Computing and Applications 3-4/2018

27.09.2018 | Special Issue Paper

Multi-Authority-Based File Hierarchy Hidden CP-ABE Scheme for Cloud Security

verfasst von: G. K. Sandhia, S. V. Kasmir Raja, K. R. Jansi

Erschienen in: Service Oriented Computing and Applications | Ausgabe 3-4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud technology is emerging as a widely accepted technology in the recent years due to its robust nature. Cloud computation is basically developed on the fact that the resources can be shared between numerous devices to achieve efficient network operation among devices with minimized computation expenses. However, the sharing nature poses a security risk for the devices whose resources are being shared. Almost in all the existing works on cloud security, a single trusted third party (TTP) is used for key issue and authorization. However, using a single TTP may results in single-point failure and security risks. Most of the previous works on cloud security focus on storage security rather than considering the computation security. In order to solve these issues, in this paper, multi-authority-based file hierarchy hidden CP-ABE scheme for cloud security is proposed. In this scheme, the files are arranged in hierarchical order based on their attribute weights. Then when a cloud user needs certain resources, it requests the cloud service provider (CSP). The CSP links with the cloud owner to provide the requested file after encrypting it. The cloud server encrypts and places the encrypted file in CSP, which is later retrieved by cloud user. In this way, all the files that are being used are encrypted along with strict authentication to ensure cloud security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Saravana Kumar N, Rajya Lakshmi GV, Balamurugan B (2015) Enhanced attribute based encryption for cloud computing. Procedia Comput Sci 46:689–696CrossRef Saravana Kumar N, Rajya Lakshmi GV, Balamurugan B (2015) Enhanced attribute based encryption for cloud computing. Procedia Comput Sci 46:689–696CrossRef
2.
Zurück zum Zitat Wang S, Liang K, Liu JK, Chen J, Jianping Yu, Xie W (2016) Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans Inf Forensics Secur 11(8):1661–1673CrossRef Wang S, Liang K, Liu JK, Chen J, Jianping Yu, Xie W (2016) Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans Inf Forensics Secur 11(8):1661–1673CrossRef
4.
Zurück zum Zitat Wang S, Zhou J, Liu JK, Jianping Yu, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277CrossRef Wang S, Zhou J, Liu JK, Jianping Yu, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277CrossRef
5.
Zurück zum Zitat Phuong TVX, Yang G, Susilo W (2016) Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans Inf Forensics Secur 11(1):35–45CrossRef Phuong TVX, Yang G, Susilo W (2016) Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans Inf Forensics Secur 11(1):35–45CrossRef
6.
Zurück zum Zitat Minu George C, Gnanadhas S, Saranya K (2013) A survey on attribute based encryption scheme in cloud computing. Int J Adv Res Comput Commun Eng 2(11):4408–4412 Minu George C, Gnanadhas S, Saranya K (2013) A survey on attribute based encryption scheme in cloud computing. Int J Adv Res Comput Commun Eng 2(11):4408–4412
7.
Zurück zum Zitat Luo E, Liu Q, Wang G (2016) Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun Lett 20(9):1772–1775CrossRef Luo E, Liu Q, Wang G (2016) Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun Lett 20(9):1772–1775CrossRef
8.
Zurück zum Zitat Wei L, Zhu H, Cao Z, Dong X, Jia W, Chen Y, Vasilakos AV (2013) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371–386CrossRef Wei L, Zhu H, Cao Z, Dong X, Jia W, Chen Y, Vasilakos AV (2013) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371–386CrossRef
9.
Zurück zum Zitat Naik AR, Damahe LB (2016) Enhancing data security and access control in cloud environment using modified attribute based encryption mechanism. Int J Comput Netw Inf Secur 10:53–60 Naik AR, Damahe LB (2016) Enhancing data security and access control in cloud environment using modified attribute based encryption mechanism. Int J Comput Netw Inf Secur 10:53–60
10.
Zurück zum Zitat Fan C-I, Tseng Y-F, Lin C-W (2016) Attribute-based encryption from identity-based encryption. J Latex Class Files 2016:6 Fan C-I, Tseng Y-F, Lin C-W (2016) Attribute-based encryption from identity-based encryption. J Latex Class Files 2016:6
11.
Zurück zum Zitat Challagidad PS, Reshmi VS, Birje MN (2017) Reputation based trust model in cloud computing. Internet Things Cloud Comput 5(5–1):5–12 Challagidad PS, Reshmi VS, Birje MN (2017) Reputation based trust model in cloud computing. Internet Things Cloud Comput 5(5–1):5–12
12.
Zurück zum Zitat Gaetani E, Aniello L, Baldoni R, Lombardi F, Margheri A, Sassone V (2017) Block chain-based database to ensure data integrity in cloud computing environments. In: Proceedings of the first Italian conference on cybersecurity (ITASEC17), Venice, Italy Gaetani E, Aniello L, Baldoni R, Lombardi F, Margheri A, Sassone V (2017) Block chain-based database to ensure data integrity in cloud computing environments. In: Proceedings of the first Italian conference on cybersecurity (ITASEC17), Venice, Italy
13.
Zurück zum Zitat Zheng H, Wu J, Wang B, Chen J (2017) Modified ciphertext-policy attribute-based encryption scheme with efficient revocation for PHR system. Math Probl Eng 2017:6808190-1–6808190-10 Zheng H, Wu J, Wang B, Chen J (2017) Modified ciphertext-policy attribute-based encryption scheme with efficient revocation for PHR system. Math Probl Eng 2017:6808190-1–6808190-10
14.
Zurück zum Zitat A. De Caro and V. Iovino, “jPBC: Java pairing based cryptography,” in Proc. IEEE Symp. Comput. Commun., Jun./Jul. 2011, pp. 850–855 A. De Caro and V. Iovino, “jPBC: Java pairing based cryptography,” in Proc. IEEE Symp. Comput. Commun., Jun./Jul. 2011, pp. 850–855
15.
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: Proceedings of IEEE symposium on security and privacy, pp 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: Proceedings of IEEE symposium on security and privacy, pp 321–334
16.
Zurück zum Zitat Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354CrossRef Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354CrossRef
Metadaten
Titel
Multi-Authority-Based File Hierarchy Hidden CP-ABE Scheme for Cloud Security
verfasst von
G. K. Sandhia
S. V. Kasmir Raja
K. R. Jansi
Publikationsdatum
27.09.2018
Verlag
Springer London
Erschienen in
Service Oriented Computing and Applications / Ausgabe 3-4/2018
Print ISSN: 1863-2386
Elektronische ISSN: 1863-2394
DOI
https://doi.org/10.1007/s11761-018-0240-6

Weitere Artikel der Ausgabe 3-4/2018

Service Oriented Computing and Applications 3-4/2018 Zur Ausgabe