Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm

  • R. Naresh
  • M. Sayeekumar
  • G. M. Karthick
  • P. SuprajaEmail author


File storing as well as retrieving is the most important security-related research area in cloud. Based on our literature survey, many researchers have developed several searchable encryption protocols. Among the several protocols, only minimum number of protocols satisfies the efficient file retrieval from the cloud. Previous research papers support the file encryption based on the keyword, secret key and random number. But in this research paper, we have proposed attribute-based encryption based on the hierarchical manner. The collections of files are encrypted under one common access layer. Compared to earlier researches, our attribute-based hierarchical file encryption scheme supports very less computation as well as storage complexity. We have constructed a new index model named data vector (DV) tree using crossover genetic algorithm which is a component of the soft computing. The DV tree is built based on the term frequency, inverse document frequency and attributes of the file. We have also developed a new key generation, encryption and decryption function for efficient retrieval of files towards the data users.


Computation complexity Storage complexity Index tree Privacy Attributes 


Compliance with ethical standards

Conflict of interest

All authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.


  1. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: IEEE symposium on security and privacy, pp 321–334Google Scholar
  2. Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25:222–233CrossRefGoogle Scholar
  3. Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z, Zomaya A (2016) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst 27:951–963CrossRefGoogle Scholar
  4. Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM conference on computer and communications security, pp 79–88Google Scholar
  5. Dan B, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp 535–554Google Scholar
  6. Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 275:370–384MathSciNetCrossRefzbMATHGoogle Scholar
  7. Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27:2546–2559CrossRefGoogle Scholar
  8. Goh EJ (2003) Secure indexes. Cryptology ePrint Archive.
  9. Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. Lect Notes Comput Sci 3089:31–45CrossRefzbMATHGoogle Scholar
  10. Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. DBLPGoogle Scholar
  11. Guo F, Mu Y, Susilo W, Wong DS (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf Forensics Secur 9:763–771CrossRefGoogle Scholar
  12. Hur J, Dong KN (2010) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221CrossRefGoogle Scholar
  13. Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: International conference on theory and applications of cryptographic techniques, pp 62–91Google Scholar
  14. Li J, Shi Y, Zhang Y (2017a) Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int J Commun Syst 30(1):e2942CrossRefGoogle Scholar
  15. Li J, Yao W, Zhang Y, Qian H, Han J (2017b) Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans Serv Comput 10(5):785–796CrossRefGoogle Scholar
  16. Li J, Wang Y, Zhang Y, Han J (2017c) Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans Serv Comput. Google Scholar
  17. Li J, Lin X, Zhang Y, Han J (2017d) KSF-OABE: outsourced attribute based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715–725CrossRefGoogle Scholar
  18. Li J, Yao W, Han J, Zhang Y, Shen J (2018) User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Systems J 12(2):1767–1777CrossRefGoogle Scholar
  19. Liang K, Man HA, Liu JK, Susilo W, Wong DS, Yang G, Yu Y, Yang A (2015) A secure and efficient ciphertext-policy attribute based proxy re-encryption for cloud data sharing. Future Gener Comput Syst 52:95–108CrossRefGoogle Scholar
  20. Luo E, Liu Q, Wang G (2016) Hierarchical multi-authority and attribute based encryption friend discovery scheme in mobile social networks. IEEE Commun Lett 20:1772–1775CrossRefGoogle Scholar
  21. Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2017a) Attribute based keyword search over hierarchical data in cloud computing. IEEE Trans Serv Comput PP(99):1Google Scholar
  22. Miao Y, Ma J, Liu X, Li X, Liu Z, Li H (2017b) Practical attribute based multi-keyword search scheme in mobile crowdsourcing. IEEE Internet Things J PP(99):1Google Scholar
  23. Miao Y, Ma J, Liu X, Jiang Q, Zhang J, Shen L, Liu Z (2017c) VCKSM: verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings. Pervasive Mob Comput 40:205–219CrossRefGoogle Scholar
  24. Pandiaraja P, Vijayakumar P, Vijayakumar V, Seshadhri R (2017) Computation efficient attribute based broadcast group key management for secure document access in public cloud. J Inf Sci Eng 33(3):695–712MathSciNetGoogle Scholar
  25. Qian H, Li J, Zhang Y, Han J (2015) Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int J Inf Secur 14(6):487–497CrossRefGoogle Scholar
  26. Rao YS (2017) A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener Comput Syst 67:133–151CrossRefGoogle Scholar
  27. Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16:69–73CrossRefGoogle Scholar
  28. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: International conference on theory and applications of cryptographic techniques, pp 457–473Google Scholar
  29. Song DX, Wagner D, Perrig A (2002) Practical techniques for searches on encrypted data. In: 2000 IEEE symposium on security and privacy, 2000. S&P 2000. Proceedings, pp 1–44Google Scholar
  30. Supraja P, Jayashri S (2017) Optimized neural network for spectrum prediction scheme in cognitive radio. Wireless Pers Commun 94(4):2597–2611CrossRefGoogle Scholar
  31. Swaminathan A, Mao Y, Su GM, Gou H, Varna AL, He S, Wu M, Oard DW (2007) Confidentiality-preserving rank-ordered search. ACM workshop on storage security and survivability, storages 2007, Alexandria, VA, USA, October, pp 7–12Google Scholar
  32. Vijayakumar P, Naresh R, Deborah LJ, Islam SKH (2016a) An efficient group key agreement protocol for secure peer to peer communication. Secur Commun Netw 9(17):3952–3965CrossRefGoogle Scholar
  33. Vijayakumar P, Naresh R, Islam SKH, Deborah LJ (2016b) An effective key distribution for secure internet pay-TV using access key hierarchies. Secur Commun Netw 9(18):5085–5097CrossRefGoogle Scholar
  34. Vijayakumar P, Pandiaraja P, Karuppiah M, Deborah LJ (2017) An efficient secure communication for healthcare system using wearable devices. Comput Electr Eng 63:232–245CrossRefGoogle Scholar
  35. Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7:743–754CrossRefGoogle Scholar
  36. Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: ACM conference on computer and communications security, pp 735–737Google Scholar
  37. Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23:1467–1479CrossRefGoogle Scholar
  38. Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277CrossRefGoogle Scholar
  39. Wang N, Fu J, Bhargava BK, Zeng J (2018) Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans Inf Forensics Secur 13(10):2653–2667CrossRefGoogle Scholar
  40. Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27:340–352CrossRefGoogle Scholar
  41. Yang Y, Liu JK, Liang K, Choo KKR, Zhou J (2015) Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data, vol 9327. Springer International PublishingGoogle Scholar
  42. Zerr S, Olmedilla D, Nejdl W, Siberski W (2009) Zerber+r : topk retrieval from a confidential index. In International conference on extending database technology: advances in database technology, pp 439–449Google Scholar
  43. Zhong Y, Ma A, Ong Z, Zhang L (2018) Computational intelligence in optical remote sensing image processing. Appl Soft Comput 64(9):75–93. CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringSRM Institute of Science and TechnologyKattankulathurIndia
  2. 2.Department of Information TechnologySRM Institute of Science and TechnologyKattankulathurIndia

Personalised recommendations