Abstract
In order to ensure the security of users’ information effectively, this paper investigates ciphertext-based attribute encryption. Homomorphic encryption can settle the problems of data privacy in cloud environments, in the way that can be operated directly to achieve the same result as for plaintext operations. In this paper, on the premise of attribute encryption, we propose an attribute-based fully homomorphism encryption scheme with LSSS matrix and a ciphertext-based retrieval scheme on this basis. Firstly, the retrieval scheme supports fine-grained cum flexible access control along with “Query-Response” mechanism to enable users to efficiently retrieve desired data from cloud servers. Secondly, the scheme supports considerable flexibility to revoke system privileges from users without updating the key client, which reduces the burden of the client greatly. Security analysis shows that the scheme can resist collusion attack. A comparison of the performance with existing CP-ABE schemes indicates that our scheme reduces the computation cost greatly for users and guarantees only the owners of the evaluation keys can perform ciphertext retrieval, which is also one of the main advantages of the proposed scheme.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Asija R, Nallusamy R (2016) Healthcare saaS based on a data model with built-in security and privacy. Int J Cloud Appl Comput 6(3):1–14
Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451–18472
Beimel A (1996) Secure schemes for secret sharing and key distribution. Technion-Israel Institute of technology, Faculty of computer science
Bensaid C, Hacene SB, Faraoun KM (2016) Detection and ignoring of blackhole attack in vanets networks. Int J Cloud Appl Comput 6(2):1–10
Bethencourt J, Sahai A, Waters B (2007) Cipher text-policy attribute-based encryption. In: IEEE symposium on security and privacy, Berkeley, CA, USA, pp 321–334
Brakerski Z (2012) Fully homomorphic encryption without modulus switching from classical gaps VP. Lect Notes Comput Sci 7417:868–886
Brakerski Z, Vaikuntanathan V (2014) Efficient fully homomorphic encryption from (Standard) LWE. SIAM J Comput 43(2):97–106
Brakerski Z, Gentry C, Vaikuntanathan V (2014) (Leveled) Fully homomorphic encryption without bootstrapping. ACM Trans Comput Theory 6(3):1942–3454
Chase M (2007) Multi-authority attribute based encryption. In: Theory of Cryptography Conference. Springer, Berlin, Heidelberg, German, pp 515–534
Chen X, Huang X, Li J, Ma J, Wong DS, Lou W (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans Inf Forensics Secur 10(1):69–78
Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184–3195
Gao C, Cheng Q, Li X, Xia S (2018) Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Clust Comput. https://doi.org/10.1007/s10586-017-1649-y
Gentry C (2009a) Fully homomorphic encryption using ideal lattices. ACM Symp Theory Comput 9(4):169–178
Gentry C (2009b) A fully homomorphic encryption scheme. Stanford University, Standford
Gentry C, Halevi S (2011) Implementing Gentry’s fully-homomorphic encryption scheme. Adv Cryptol C EUROCRYPT 6632:129–148
Goyal V, Pandey O, Sahai A, et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: ACM conference on computer and communications security, New York, NY, USA, pp 89–98
Gupta B, Agrawal DP, Yamaguchi S (eds) (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey
Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inf Sci 412–413:223–241
Hur J (2013) Improving security and efficiency in attribute-based data sharing. IEEE Trans Knowl Data Eng 25(10):2271–2282
Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221
Jouini M, Rabai LBA (2016) A security framework for secure cloud computing environments. Int J Cloud Appl Comput 6(3):32–44
Karchmer M, Wigderson A (1993) On span programs. In: Structure in complexity theory conference 1993, San Diego, CA, USA, pp 102–111
Lewko A, Okamoto T, Sahai A et al (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: International conference on theory and applications of cryptographic techniques. Springer, Berlin, pp 62–91
Li Y, Zeng Z (2013) Outsourced decryption scheme supporting attribute revocation. J Tsinghua Univ (Sci Technol) 53(12):1664–1669
Li J, Li Y, Chen X, Lee P, Lou W (2015) A hybrid cloud approach for secure authorized eeduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216
Li J, Sun L, Yan Q, Li Z, Srisa-an W, Ye H (2017a) Significant permission identification for machine learning based android malware detection. IEEE Trans Ind Inform. https://doi.org/10.1109/TII.2017.2789219
Li P, Li J, Huang Z, Li T, Gao C-Z, Yiu S-M, Chen K (2017b) Multi-key privacy-preserving deep learning in cloud computing. Future Gener Comput Syst 74:76–85
Li P, Li J, Huang Z, Gao C-Z, Chen W-B, Chen K (2017c) Privacy-preserving outsourced classification in cloud computing. Clust Comput 21(1):1–10
Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12
Liu Q, Li T (2016) Policy based multi-user full homomorphic encryption method in cloud computing. J Guangxi Univ (Nat Sci Ed) 41(3):786–795
Mouhib I, El Ouadghiri D, Naanani H (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput 7(2):27–40
Nagar N, Suman U (2016) Analyzing virtualization vulnerabilities and eesign a secure cloud environment to prevent from XSS attack. Int J Cloud Appl Comput 6(1):1–14
Sahai A, Waters B (2005) Fuzzy identity-based encryption. Lect Notes Comput Sci 3494:457–473
Shamir A (2011) How to share a secret. Commun ACM 22(22):612–613
Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123
Smart NP, Vercauteren F (2010) Fully homomorphic encryption with relatively small key and cipher text sizes. Springer, Berlin
Tang D, Zhu S (2014) Fully Homomorphic encryption scheme from RLWE. J Commun 1(20):173–182
van Dijk M, Gentry C, Halevi S, Vaikuntanathan V (2010) Fully homomorphic encryption over the integers. Adv Cryptol C EUROCRYPT 6110:24–43
Waters B (2011) Cipher-text-policy attribute-based encryption. Springer, Berlin, pp 53–70
Yang K, Jia X, Ren K (2013) Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: ACM SIGSAC symposium on information, computer and communications security, New York, NY, USA, pp 523–528
Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608
Yuan C, Li X, Jonathan Wu QM, Li J, Sun X (2017) Fingerprint liveness detection from different fingerprint materials using convolutional neural network and principal component analysis. Comput Mater Contin 53(3):357–371
Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61
Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2016) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access 6:711–722
Acknowledgements
This article is supported in part by the National Natural Science Foundation of China (61772150), the National Cryptography Development Foundation of China (MMJJ20170217) and Guangxi Key Research and Development Program AB17195025, and the open project of Guangxi Key Lab. of crypto, and Info. Security (Grant No. GCIS201622), and the GUET Excellent Graduate Thesis Program(16YJPYSS23). We thank Zhiqiang Gao, Xi Zhao for helpful comments and discussions.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest with any individual or organization.
Human and animals rights
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Communicated by B. B. Gupta.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ding, Y., Han, B., Wang, H. et al. Ciphertext retrieval via attribute-based FHE in cloud computing. Soft Comput 22, 7753–7761 (2018). https://doi.org/10.1007/s00500-018-3404-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-018-3404-6