scispace - formally typeset
Journal ArticleDOI

A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud

TLDR
This paper proposes a new verifiable outsourced CP-ABE for big data privacy and access control in the cloud that reduces the computational overhead of encryption and decryption by outsourcing the heavy computations to the proxy server and proves that the scheme is efficient.
Abstract
The foremost security concerns for big data in the cloud are privacy and access control. Ciphertext-policy attribute based encryption (CP-ABE) is an effective cryptographic solution for above concerns, but the existing CP-ABE schemes are not suitable for big data in the cloud as they require huge computation time for encryption and decryption process. In this paper, we propose a new verifiable outsourced CP-ABE for big data privacy and access control in the cloud. Our scheme reduces the computational overhead of encryption and decryption by outsourcing the heavy computations to the proxy server. Our scheme also verifies the correctness of the data along with the outsourcing computations. Further, our scheme limits the data access for a set of users instead of providing an infinite number of times data access, which is essentially required for commercial applications. In security analysis, we prove that our scheme is secure against chosen plain-text attack, collusion and proxy attacks. Performance analysis proves that our scheme is efficient.

read more

Citations
More filters
Journal ArticleDOI

Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage

TL;DR: This article seeks to address both key abuse and key escrow concerns when deploying ABE in a cloud computing environment, and its scheme is based on prime order bilinear groups, and is shown to be selectively secure in the standard model.
Journal ArticleDOI

Efficient Escrow-free CP-ABE with Constant Size Ciphertext and Secret Key for Big Data Storage in Cloud

TL;DR: The CP-ABE-CPABE scheme reduces the intensity of encryption, but not the quality, of the decryption used in other schemes.
Journal ArticleDOI

An efficient certificateless public key cryptography with authorized equality test in IIoT

TL;DR: This paper nominates a Certificateless Public Key Cryptography with Authorized Equivalent Test (CL-PKC-AET), whereby, a cloud server is given authority to actuate if two encryptions consist of the equivalent messages, and defines its scheme basing on bilinear pairing and advocate within the random oracle model its security, based on the Bilinear Diffie-Hellman assumption.
Journal ArticleDOI

Enhanced attribute based access control with secure deduplication for big data storage in cloud

TL;DR: This paper proposes an enhanced attribute based access control with secure deduplication for big data storage in cloud (EABAC-SD), which achieves dynamic ownership management using the group key and allows only authorized data owners to upload the data which enhances the security.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI

Attribute-based encryption for fine-grained access control of encrypted data

TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book ChapterDOI

Fuzzy identity-based encryption

TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content

Fuzzy Identity Based Encryption.

TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Related Papers (5)