[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

Ciphertext retrieval via attribute-based FHE in cloud computing

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In order to ensure the security of users’ information effectively, this paper investigates ciphertext-based attribute encryption. Homomorphic encryption can settle the problems of data privacy in cloud environments, in the way that can be operated directly to achieve the same result as for plaintext operations. In this paper, on the premise of attribute encryption, we propose an attribute-based fully homomorphism encryption scheme with LSSS matrix and a ciphertext-based retrieval scheme on this basis. Firstly, the retrieval scheme supports fine-grained cum flexible access control along with “Query-Response” mechanism to enable users to efficiently retrieve desired data from cloud servers. Secondly, the scheme supports considerable flexibility to revoke system privileges from users without updating the key client, which reduces the burden of the client greatly. Security analysis shows that the scheme can resist collusion attack. A comparison of the performance with existing CP-ABE schemes indicates that our scheme reduces the computation cost greatly for users and guarantees only the owners of the evaluation keys can perform ciphertext retrieval, which is also one of the main advantages of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Asija R, Nallusamy R (2016) Healthcare saaS based on a data model with built-in security and privacy. Int J Cloud Appl Comput 6(3):1–14

    Google Scholar 

  • Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451–18472

    Article  Google Scholar 

  • Beimel A (1996) Secure schemes for secret sharing and key distribution. Technion-Israel Institute of technology, Faculty of computer science

    Google Scholar 

  • Bensaid C, Hacene SB, Faraoun KM (2016) Detection and ignoring of blackhole attack in vanets networks. Int J Cloud Appl Comput 6(2):1–10

    Google Scholar 

  • Bethencourt J, Sahai A, Waters B (2007) Cipher text-policy attribute-based encryption. In: IEEE symposium on security and privacy, Berkeley, CA, USA, pp 321–334

  • Brakerski Z (2012) Fully homomorphic encryption without modulus switching from classical gaps VP. Lect Notes Comput Sci 7417:868–886

    Article  Google Scholar 

  • Brakerski Z, Vaikuntanathan V (2014) Efficient fully homomorphic encryption from (Standard) LWE. SIAM J Comput 43(2):97–106

    Article  MathSciNet  Google Scholar 

  • Brakerski Z, Gentry C, Vaikuntanathan V (2014) (Leveled) Fully homomorphic encryption without bootstrapping. ACM Trans Comput Theory 6(3):1942–3454

    Article  MathSciNet  Google Scholar 

  • Chase M (2007) Multi-authority attribute based encryption. In: Theory of Cryptography Conference. Springer, Berlin, Heidelberg, German, pp 515–534

    Chapter  Google Scholar 

  • Chen X, Huang X, Li J, Ma J, Wong DS, Lou W (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans Inf Forensics Secur 10(1):69–78

    Article  Google Scholar 

  • Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184–3195

    Article  MathSciNet  Google Scholar 

  • Gao C, Cheng Q, Li X, Xia S (2018) Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Clust Comput. https://doi.org/10.1007/s10586-017-1649-y

    Article  Google Scholar 

  • Gentry C (2009a) Fully homomorphic encryption using ideal lattices. ACM Symp Theory Comput 9(4):169–178

    MathSciNet  MATH  Google Scholar 

  • Gentry C (2009b) A fully homomorphic encryption scheme. Stanford University, Standford

    MATH  Google Scholar 

  • Gentry C, Halevi S (2011) Implementing Gentry’s fully-homomorphic encryption scheme. Adv Cryptol C EUROCRYPT 6632:129–148

    MathSciNet  MATH  Google Scholar 

  • Goyal V, Pandey O, Sahai A, et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: ACM conference on computer and communications security, New York, NY, USA, pp 89–98

  • Gupta B, Agrawal DP, Yamaguchi S (eds) (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey

    Google Scholar 

  • Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inf Sci 412–413:223–241

    Article  Google Scholar 

  • Hur J (2013) Improving security and efficiency in attribute-based data sharing. IEEE Trans Knowl Data Eng 25(10):2271–2282

    Article  Google Scholar 

  • Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221

    Article  Google Scholar 

  • Jouini M, Rabai LBA (2016) A security framework for secure cloud computing environments. Int J Cloud Appl Comput 6(3):32–44

    Google Scholar 

  • Karchmer M, Wigderson A (1993) On span programs. In: Structure in complexity theory conference 1993, San Diego, CA, USA, pp 102–111

  • Lewko A, Okamoto T, Sahai A et al (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: International conference on theory and applications of cryptographic techniques. Springer, Berlin, pp 62–91

    Chapter  Google Scholar 

  • Li Y, Zeng Z (2013) Outsourced decryption scheme supporting attribute revocation. J Tsinghua Univ (Sci Technol) 53(12):1664–1669

    Google Scholar 

  • Li J, Li Y, Chen X, Lee P, Lou W (2015) A hybrid cloud approach for secure authorized eeduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216

    Article  Google Scholar 

  • Li J, Sun L, Yan Q, Li Z, Srisa-an W, Ye H (2017a) Significant permission identification for machine learning based android malware detection. IEEE Trans Ind Inform. https://doi.org/10.1109/TII.2017.2789219

    Article  Google Scholar 

  • Li P, Li J, Huang Z, Li T, Gao C-Z, Yiu S-M, Chen K (2017b) Multi-key privacy-preserving deep learning in cloud computing. Future Gener Comput Syst 74:76–85

    Article  Google Scholar 

  • Li P, Li J, Huang Z, Gao C-Z, Chen W-B, Chen K (2017c) Privacy-preserving outsourced classification in cloud computing. Clust Comput 21(1):1–10

    Google Scholar 

  • Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12

    Article  Google Scholar 

  • Liu Q, Li T (2016) Policy based multi-user full homomorphic encryption method in cloud computing. J Guangxi Univ (Nat Sci Ed) 41(3):786–795

    Google Scholar 

  • Mouhib I, El Ouadghiri D, Naanani H (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput 7(2):27–40

    Google Scholar 

  • Nagar N, Suman U (2016) Analyzing virtualization vulnerabilities and eesign a secure cloud environment to prevent from XSS attack. Int J Cloud Appl Comput 6(1):1–14

    Google Scholar 

  • Sahai A, Waters B (2005) Fuzzy identity-based encryption. Lect Notes Comput Sci 3494:457–473

    Article  MathSciNet  Google Scholar 

  • Shamir A (2011) How to share a secret. Commun ACM 22(22):612–613

    MathSciNet  MATH  Google Scholar 

  • Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123

    Article  Google Scholar 

  • Smart NP, Vercauteren F (2010) Fully homomorphic encryption with relatively small key and cipher text sizes. Springer, Berlin

    MATH  Google Scholar 

  • Tang D, Zhu S (2014) Fully Homomorphic encryption scheme from RLWE. J Commun 1(20):173–182

    Google Scholar 

  • van Dijk M, Gentry C, Halevi S, Vaikuntanathan V (2010) Fully homomorphic encryption over the integers. Adv Cryptol C EUROCRYPT 6110:24–43

    MathSciNet  MATH  Google Scholar 

  • Waters B (2011) Cipher-text-policy attribute-based encryption. Springer, Berlin, pp 53–70

    MATH  Google Scholar 

  • Yang K, Jia X, Ren K (2013) Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: ACM SIGSAC symposium on information, computer and communications security, New York, NY, USA, pp 523–528

  • Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

    Article  Google Scholar 

  • Yuan C, Li X, Jonathan Wu QM, Li J, Sun X (2017) Fingerprint liveness detection from different fingerprint materials using convolutional neural network and principal component analysis. Comput Mater Contin 53(3):357–371

    Google Scholar 

  • Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61

    Article  Google Scholar 

  • Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2016) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access 6:711–722

    Article  Google Scholar 

Download references

Acknowledgements

This article is supported in part by the National Natural Science Foundation of China (61772150), the National Cryptography Development Foundation of China (MMJJ20170217) and Guangxi Key Research and Development Program AB17195025, and the open project of Guangxi Key Lab. of crypto, and Info. Security (Grant No. GCIS201622), and the GUET Excellent Graduate Thesis Program(16YJPYSS23). We thank Zhiqiang Gao, Xi Zhao for helpful comments and discussions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huiyong Wang.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest with any individual or organization.

Human and animals rights

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Communicated by B. B. Gupta.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ding, Y., Han, B., Wang, H. et al. Ciphertext retrieval via attribute-based FHE in cloud computing. Soft Comput 22, 7753–7761 (2018). https://doi.org/10.1007/s00500-018-3404-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-018-3404-6

Keywords

Navigation