Abstract
According to characteristics of mass encryption service in cloud storage, this paper proposed an improved SCP-OOABE scheme which uses the access control tree as a control structure and decomposes key generation and encryption into online and offline phase respectively that could be finished in a short time in online phase. In addition, it also avoids the problem that CP-OOABE scheme can’t generate keys when constructing access control structures. What’s more, it meets the demand of the complex access control structure in cloud storage and was proved that the scheme is against chosen-plaintext attack secure. In a word, our scheme was security, efficient and universal, which suits for the demands of cloud storage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Qiu, M., et al.: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Gener. Comput. Syst. (2016)
Gai, K., Qiu, M., Zhao, H., et al.: Privacy-aware adaptive data encryption strategy of big data in cloud computing. In: IEEE International Conference on Cyber Security and Cloud Computing, Beijing (China), pp. 273–278. IEEE (2016)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). doi:10.1007/11426639_27
Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, New York (USA), pp. 89–98. ACM (2006)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Security and Privacy, Los Alamitos, pp. 321-334. IEEE (2007)
Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, New York (USA), pp. 463–474. ACM (2013)
Hohenberger, S., Waters, B.: Online/offline attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 293–310. Springer, Heidelberg (2014). doi:10.1007/978-3-642-54631-0_17
Chow, S.S.M., Liu, J.K., Zhou, J.: Identity-based online/offline key encapsulation and encryption. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, New York (USA), pp. 52–60. ACM (2011)
Guo, F., Mu, Y., Chen, Z.: Identity-based online/offline encryption. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 247–261. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85230-8_22
Li, Y., Dai, W., Qiu, M., Ming, Z.: Privacy protection for preventing data over-collection in smart city. IEEE Trans. Comput. (2015)
Beimel, A.: Secure schemes for secret sharing and key distribution, Technion-Israel Institute of technology, Faculty of computer science, Haifa, Isral (1996)
Wang, Z., Chen, F., Xia, A.: Attribute-based online/offline encryption in smart grid. In: Computer Communication and Networks (ICCCN), pp. 1–5. IEEE, Berlin (2015)
Fan, C.I., Huang, V.S.M., Ruan, H.M.: Arbitrary-state attribute-based encryption with dynamic membership. IEEE Trans. Comput. 63(8), 1951–1961 (2014)
Zhang, X., Chen, M., Liu, H., et al.: Practical identity-based threshold decryption scheme without random oracle (in Chinese). J. ShenZhen Univ. Sci. Eng. 37(3), 340–346 (2010)
Lewko, A.: Tools for simulating features of composite order bilinear groups in the prime order setting. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 318–335. Springer, Heidelberg (2012). doi:10.1007/978-3-642-29011-4_20
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13190-5_4
Zhang, X., Chen, M., Yang, L., et al.: Cryptanalysis of an identity-based multi-recipient signcryption scheme (in Chinese). J. ShenZhen Univ. Sci. Eng. 37(4), 408–412 (2010)
Galindo, D.: Boneh-Franklin identity based encryption revisited. In: Caires, L., Italiano, Giuseppe, F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 791–802. Springer, Heidelberg (2005). doi:10.1007/11523468_64
Ruj, S., Stojmenovic, M., Nayak, A.: Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans. Parallel Distrib. Syst. 25(2), 384–394 (2014)
Qiu, M., Ming, Z., Li, J., Gai, K., Zong, Z.: Phase-change memory optimization for green cloud with genetic algorithm. IEEE Trans. Comput. 64(12), 3528–3540 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Zheng, H., Zhang, X., Yang, Q. (2017). An Improved Ciphertext-Policy Attribute-Based Encryption Scheme. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2016. Lecture Notes in Computer Science(), vol 10135. Springer, Cham. https://doi.org/10.1007/978-3-319-52015-5_41
Download citation
DOI: https://doi.org/10.1007/978-3-319-52015-5_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-52014-8
Online ISBN: 978-3-319-52015-5
eBook Packages: Computer ScienceComputer Science (R0)