File Hierarchy CP-ABE Scheme Supporting Graded User Access
Author:
Affiliation:

Clc Number:

TP309

  • Article
  • | |
  • Metrics
  • |
  • Reference [27]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    The file hierarchy ciphertext policy attribute-based encryption (FH-CP-ABE) scheme realizes multi-level files encryption with the single access policy, which saves the computation cost of encryption and decryption and the storage cost of ciphertext. Nevertheless, the existing file hierarchy CP-ABE scheme cannot support graded user access, while suffers due to the unauthorized access. For this reason, a file hierarchy CP-ABE scheme that supports graded user access is proposed. In the proposed scheme, the graded user access tree is constructed, and the ciphertext subsections are reconstructed to support the access requirements of graded users, thus eliminate the possibility of users to conduct unauthorized access. The security analysis shows that the proposed scheme can resist selective chosen-plaintext attack. Both theoretical and experimental analyses show that the proposed scheme is more efficient in terms of computation and storage compared to related scheme.

    Reference
    [1] Sahai A, Waters B. Fuzzy identity-based encryption. In: Proc. of the 24th Annual Int’l Conf. on the Theory Raphic Techniques. Aarhus: Springer, 2004. 457–473.
    [2] Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. Alexandria: ACM, 2006. 89–98.
    [3] Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: Proc. of IEEE Symp. on Security and Privacy. Berkeley: IEEE Computer Society, 2007. 321–334.
    [4] Horwitz J, Lynn B. Toward hierarchical identity-based encryption. In: Proc. of the Int’l Conf. on the Theory and Applications of Cryptographic Techniques. Amsterdam: Springer, 2002. 466–481.
    [5] Gentry C, Silverberg A. Hierarchical ID-based cryptography. In: Proc. of the 8th Int’l Conf. on the Theory and Application of Cryptology and Information Security. Queenstown: Springer, 2002. 548–566.
    [6] Boneh D, Boyen X. Efficient selective-ID secure identity-based encryption without random oracles. In: Proc. of Int’l Conf. on the Theory and Applications of Cryptographic Techniques. Interlaken: Springer, 2004. 223–238.
    [7] Boneh D, Boyen X, Goh EJ. Hierarchical identity based encryption with constant size ciphertext. In: Proc. of the 24th Annual Int’l Conf. on the Theory and Applications of Cryptographic Techniques. Aarhus: Springer, 2005. 440–456.
    [8] Tsai TT, Tseng YM, Wu TY. RHIBE: Constructing revocable hierarchical ID-based encryption from HIBE. Informatica, 2014, 25(2): 299–326. [doi: 10.15388/Informatica.2014.16
    [9] Li J, Wang Q, Wang C, Ren K. Enhancing attribute-based encryption with attribute hierarchy. In: Proc. of the 4th Int’l Conf. on Communications and Networking. Xi’an: IEEE, 2009. 1–5.
    [10] Wang GJ, Liu Q, Wu J. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proc. of the 17th ACM Conf. on Computer and Communications Security. Chicago Illinois: ACM, 2010. 735–737.
    [11] Wan ZG, Liu JE, Deng RH. HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. on Information Forensics and Security, 2012, 7(2): 743–754. [doi: 10.1109/TIFS.2011.2172209
    [12] Deng H, Wu QH, Qin B, Domingo-Ferrer J, Zhang L, Liu JW, Shi WC. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Information Sciences, 2014, 275: 370–384. [doi: 10.1016/j.ins.2014.01.035
    [13] Wang ZY, Wang J. A provably secure ciphertext-policy hierarchical attribute-based encryption. In: Proc. of the 2015 Int’l Conf. on Cloud Computing and Security. Nanjing: Springer, 2015. 38–48.
    [14] Chandar PP, Mutkuraman D, Rathinrai M. Hierarchical attribute based proxy re-encryption access control in cloud computing. In: Proc. of the 2014 Int’l Conf. on Circuits, Power and Computing Technologies. Nagercoil: IEEE, 2014. 1565–1570.
    [15] Huang QL, Yang YX, Shen MS. Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Future Generation Computer Systems, 2017, 72: 239–249. [doi: 10.1016/j.future.2016.09.021
    [16] Lin X, Han YL. Location hierarchical access control scheme based on attribute encryption. In: Proc. of the 36th Chinese Control Conf. (CCC). Dalian: IEEE, 2017. 9010–9014.
    [17] Ali M, Mohajeri J, Sadeghi MR, Liu XM. A fully distributed hierarchical attribute-based encryption scheme. Theoretical Computer Science, 2020, 815: 25–46. [doi: 10.1016/j.tcs.2020.02.030
    [18] Wang SL, Yu JP, Zhang P, Wang P. A novel file hierarchy access control scheme using attribute-based encryption. Applied Mechanics and Materials, 2015, 701–702: 911–918.
    [19] Wang SL, Zhou JW, Liu JK, Yu JP, Chen JY, Xie WX. An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. on Information Forensics and Security, 2016, 11(6): 1265–1277. [doi: 10.1109/TIFS.2016.2523941
    [20] Jiang SC, Guo WB, Fan GS. Hierarchy attribute-based encryption scheme to support direct revocation in cloud storage. In: Proc. of the 16th IEEE/ACIS Int’l Conf. on Computer and Information Science. Wuhan: IEEE, 2017. 869–874.
    [21] Sandhia GK, Raja SVK, Jansi KR. Multi-authority-based file hierarchy hidden CP-ABE scheme for cloud security. Service Oriented Computing and Applications, 2018, 12(3–4): 295–303. [doi: 10.1007/s11761-018-0240-6
    [22] Guo R, Li X, Zheng D, Zhang YH. An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud. The Journal of Supercomputing, 2020, 76(7): 4884–4903. [doi: 10.1007/s11227-018-2644-7
    [23] Kang L, Zhang LY. Improving file hierarchy attribute-based encryption scheme with multi-authority in cloud. In: Proc. of the 2nd Int’l Conf. on Frontiers in Cyber Security. Xi’an: Springer, 2019. 3–18.
    [24] Chandrasekaran B, Nogami Y, Balakrishnan R. An efficient file hierarchy attribute based encryption using optimized tate pairing construction in cloud environment. Journal of Applied Security Research, 2020, 15(2): 270–278. [doi: 10.1080/19361610.2019.1649534
    [25] He H, Zheng LH, Li P, Deng L, Huang L, Chen X. An efficient attribute-based hierarchical data access control scheme in cloud computing. Human-centric Computing and Information Sciences, 2020, 10(1): 49. [doi: 10.1186/s13673-020-00255-5
    [26] Challagidad PS, Birje MN. Efficient multi-authority access control using attribute-based encryption in cloud storage. Procedia Computer Science, 2020, 167: 840–849. [doi: 10.1016/j.procs.2020.03.423
    [27] Li GJ, Chen NY, Zhang YC. Extended file hierarchy access control scheme with attribute-based encryption in cloud computing. IEEE Trans. on Emerging Topics in Computing, 2021, 9(2): 983–993. [doi: 10.1109/TETC.2019.2904637
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

刘帅南,刘彬,郭真,冯朝胜,秦志光,卿昱.一种支持分级用户访问的文件分层CP-ABE方案.软件学报,2023,34(7):3329-3342

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:April 14,2021
  • Revised:June 21,2021
  • Online: October 14,2022
  • Published: July 06,2023
You are the first2034797Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063