Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm
- 20 Downloads
File storing as well as retrieving is the most important security-related research area in cloud. Based on our literature survey, many researchers have developed several searchable encryption protocols. Among the several protocols, only minimum number of protocols satisfies the efficient file retrieval from the cloud. Previous research papers support the file encryption based on the keyword, secret key and random number. But in this research paper, we have proposed attribute-based encryption based on the hierarchical manner. The collections of files are encrypted under one common access layer. Compared to earlier researches, our attribute-based hierarchical file encryption scheme supports very less computation as well as storage complexity. We have constructed a new index model named data vector (DV) tree using crossover genetic algorithm which is a component of the soft computing. The DV tree is built based on the term frequency, inverse document frequency and attributes of the file. We have also developed a new key generation, encryption and decryption function for efficient retrieval of files towards the data users.
KeywordsComputation complexity Storage complexity Index tree Privacy Attributes
Compliance with ethical standards
Conflict of interest
All authors declare that they have no conflict of interest.
This article does not contain any studies with human participants or animals performed by any of the authors.
- Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: IEEE symposium on security and privacy, pp 321–334Google Scholar
- Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM conference on computer and communications security, pp 79–88Google Scholar
- Dan B, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp 535–554Google Scholar
- Goh EJ (2003) Secure indexes. Cryptology ePrint Archive. http://eprint.iacr.org/2003/216
- Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. DBLPGoogle Scholar
- Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: International conference on theory and applications of cryptographic techniques, pp 62–91Google Scholar
- Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2017a) Attribute based keyword search over hierarchical data in cloud computing. IEEE Trans Serv Comput PP(99):1Google Scholar
- Miao Y, Ma J, Liu X, Li X, Liu Z, Li H (2017b) Practical attribute based multi-keyword search scheme in mobile crowdsourcing. IEEE Internet Things J PP(99):1Google Scholar
- Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: International conference on theory and applications of cryptographic techniques, pp 457–473Google Scholar
- Song DX, Wagner D, Perrig A (2002) Practical techniques for searches on encrypted data. In: 2000 IEEE symposium on security and privacy, 2000. S&P 2000. Proceedings, pp 1–44Google Scholar
- Swaminathan A, Mao Y, Su GM, Gou H, Varna AL, He S, Wu M, Oard DW (2007) Confidentiality-preserving rank-ordered search. ACM workshop on storage security and survivability, storages 2007, Alexandria, VA, USA, October, pp 7–12Google Scholar
- Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: ACM conference on computer and communications security, pp 735–737Google Scholar
- Yang Y, Liu JK, Liang K, Choo KKR, Zhou J (2015) Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data, vol 9327. Springer International PublishingGoogle Scholar
- Zerr S, Olmedilla D, Nejdl W, Siberski W (2009) Zerber+r : topk retrieval from a confidential index. In International conference on extending database technology: advances in database technology, pp 439–449Google Scholar