Abstract
In order to enhance the privacy preserving mechanism of cloud storage scheme and promote the cloud storage system in the enterprise, we propose a cloud storage scheme with multiple encryptions. The scheme adopts hybrid cloud structure and supports the direct revocation of users. The private cloud provided by the enterprise not only protects the attribute privacy in the access policy but achieves the pre-decryption mechanism reducing the decryption overhead for users. We introduce the identity authentication mechanism in the scheme and protect the users’ identity though the homomorphic encryption over integers. Based on the Decisional Linear assumption and the integer approximate Greatest Common Divisor problem, the proposed scheme is secure in the random oracle model. The analysis shows that our scheme is more secure and practical.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Feng T, Yin XY (2016) Research on privacy preserving mechanism of attribute-based encryption cloud storage. Chin J Netw Inf Secur 2(7):8–17
Xiong AP, Gan QX, He XX et al (2013) A searchable encryption of CP-ABE scheme in cloud storage. In: International computer conference on wavelet active media technology and information processing, pp 345–349
Wang Q, Zhu Y, Luo X (2015) Multi-user searchable encryption with coarser-grained access control without key sharing. In: International conference on cloud computing and big data. IEEE, pp 119–125
Kaci A, Bouabana-Tebibel T (2015) Access control reinforcement over searchable encryption. In: IEEE international conference on information reuse and integration. IEEE, pp 130–137
Han F, Qin J, Zhao H et al (2012) A general transformation from KP-ABE to searchable encryption. In: Cyberspace safety and security. Springer, Berlin, Heidelberg, pp 107–115
Zheng Q, Xu S, Ateniese G (2015) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. IEEE INFOCOM. IEEE, pp 522–530
Liu P, Wang J, Ma H et al (2015) Efficient verifiable public key encryption with keyword search based on KP-ABE. In: Ninth international conference on broadband and wireless computing, communication and applications. IEEE, pp 584–589
Zhu H, Wang L, Ahmad H et al (2017) Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access 99:1–1
Meiyun LI, Jian LI, Huang Chao (2012) A credible cloud storage platform based on homomorphic encryption. Netinfo Secur 12(9):35–40
Acknowledgements
This study was supported by the National Natural Science Foundation of China (No. 61462060, No. 61562059), Regional Science Foundation Project (No. 61762060).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Feng, T., Yin, X., Liu, C. (2019). An Efficient and Anonymous KP-ABE Scheme with Keyword Search. In: Kim, K., Baek, N. (eds) Information Science and Applications 2018. ICISA 2018. Lecture Notes in Electrical Engineering, vol 514. Springer, Singapore. https://doi.org/10.1007/978-981-13-1056-0_26
Download citation
DOI: https://doi.org/10.1007/978-981-13-1056-0_26
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1055-3
Online ISBN: 978-981-13-1056-0
eBook Packages: EngineeringEngineering (R0)