Journal ArticleDOI
A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud
TLDR
This paper proposes a new verifiable outsourced CP-ABE for big data privacy and access control in the cloud that reduces the computational overhead of encryption and decryption by outsourcing the heavy computations to the proxy server and proves that the scheme is efficient.Abstract:
The foremost security concerns for big data in the cloud are privacy and access control. Ciphertext-policy attribute based encryption (CP-ABE) is an effective cryptographic solution for above concerns, but the existing CP-ABE schemes are not suitable for big data in the cloud as they require huge computation time for encryption and decryption process. In this paper, we propose a new verifiable outsourced CP-ABE for big data privacy and access control in the cloud. Our scheme reduces the computational overhead of encryption and decryption by outsourcing the heavy computations to the proxy server. Our scheme also verifies the correctness of the data along with the outsourcing computations. Further, our scheme limits the data access for a set of users instead of providing an infinite number of times data access, which is essentially required for commercial applications. In security analysis, we prove that our scheme is secure against chosen plain-text attack, collusion and proxy attacks. Performance analysis proves that our scheme is efficient.read more
Citations
More filters
Journal ArticleDOI
Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage
TL;DR: This article seeks to address both key abuse and key escrow concerns when deploying ABE in a cloud computing environment, and its scheme is based on prime order bilinear groups, and is shown to be selectively secure in the standard model.
Journal ArticleDOI
Efficient Escrow-free CP-ABE with Constant Size Ciphertext and Secret Key for Big Data Storage in Cloud
TL;DR: The CP-ABE-CPABE scheme reduces the intensity of encryption, but not the quality, of the decryption used in other schemes.
Journal ArticleDOI
An efficient certificateless public key cryptography with authorized equality test in IIoT
TL;DR: This paper nominates a Certificateless Public Key Cryptography with Authorized Equivalent Test (CL-PKC-AET), whereby, a cloud server is given authority to actuate if two encryptions consist of the equivalent messages, and defines its scheme basing on bilinear pairing and advocate within the random oracle model its security, based on the Bilinear Diffie-Hellman assumption.
Journal ArticleDOI
Enhanced attribute based access control with secure deduplication for big data storage in cloud
TL;DR: This paper proposes an enhanced attribute based access control with secure deduplication for big data storage in cloud (EABAC-SD), which achieves dynamic ownership management using the group key and allows only authorized data owners to upload the data which enhances the security.
Journal ArticleDOI
Public key encryption with equality test for Industrial Internet of Things system in cloud computing
Ganesh Gopal Deverajan,V. Muthukumaran,Ching-Hsien Hsu,Ching-Hsien Hsu,Marimuthu Karuppiah,Yeh‐Ching Chung,Ying‐Huei Chen +6 more
TL;DR: This paper aims to provide a history of computer science and engineering in China and its applications in the context of modern medicine and science.
References
More filters
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI
Ciphertext-Policy Attribute-Based Encryption
TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI
Attribute-based encryption for fine-grained access control of encrypted data
TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book ChapterDOI
Fuzzy identity-based encryption
Amit Sahai,Brent Waters +1 more
TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content
Fuzzy Identity Based Encryption.
Amit Sahai,Brent Waters +1 more
TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.