Abstract
Attribute based encryption is suitable for data protection in data outsourcing systems such as cloud computing. However, the leveraging of encryption technique may retrain some routine operations over the encrypted data, particularly in the field of data retrieval. This paper presents an attribute based date retrieval with proxy re-encryption (ABDR-PRE) to provide both fine-grained access control and retrieval over the ciphertexts. The proposed scheme achieves fine-grained data access management by adopting KP-ABE mechanism, a delegator can generate the re-encryption key and search indexes for the ciphertexts to be shared over the target delegatee’s attributes. Throughout the process of data sharing, the data are transferred as ciphers thus the server and unauthorized users cannot acquire the sensitive information of the encrypted data so the privacy and confidentiality can be protected. By security analysis, the proposed scheme meets the security requirements confidentiality, keyword semantic security as well as collusion attack resistance.
Similar content being viewed by others
References
Li J, Liu Z, Chen X, Tan X, Wong DS (2015) L-EncDB: A Lightweight Framework for Privacy-Preserving Data Queries in Cloud Computing. Knowl-Based Syst 79:18–26
Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the Protection for Data Security under Selective Opening Attacks. Inf Sci 412–413:223–241
Bhuiyan MZA, Wu J, Wang G, Chen Z, Chen J, Wang T (April 2017) Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks. IEEE Transactions on Industrial Informatics 13(2):572–583
Bhuiyan MZA, Wu J, Wang G, Cao J (2016) Sensing and Decision-making in Cyber-Physical Systems: The Case of Structural Health Monitoring. IEEE Transactions on Industrial Informatics 12(6):2103–2114
Liu X, Choo K-KR, Deng RH, Lu R, Weng J (2018) Efficient and Privacy-Preserving Outsourced Computation of Rational Numbers. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC) 15(1):27–39. https://doi.org/10.1109/TDSC.2016.2536601
Liu X, Deng RH, Choo K-KR (2018) Privacy-Preserving Outsourced Calculation Toolkit in the Cloud. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC). https://doi.org/10.1109/TDSC.2018.2816656
Hong H, Sun Z, Liu X (2017) Provably secure attribute based signcryption with delegated computation and efficient key updating. KSII Transactions on Internet and Information Systems 11(5):2646–2659
Liu Z, Huang Y, Li J (2018) DivORAM: Towards a Practical Oblivious RAM with Variable Block Size. Inf Sci 447:1–11
Xu J, Wei L, Yu Z (April 2018) Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures. Volume 107(1):113–124
Sahai A, Waters B (2005) Fuzzy identity-based encryption. Advances in Cryptology-EUROCRYPT:457–473
Goyal Y, Pandey O, Sahai A, et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications. Security 89-98
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy 2007:321–334
Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Public Key Cryptography-PKC 2011:53–70
Li LF, Chen XW, Jiang H et al (2016) P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for clouds. 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 575-580
Reedy BE, Ramu GH (2016) A Secure Framework for Ensuring EHR's Integrity Using Fine-Grained Auditing and CP-ABE. 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS): 85-89
Liu Z, Wong DS (2015) Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe”. Volume 9092 of the series Lecture Notes in Computer Science, Applied Cryptography and Network Security 127-146
Yang K, Jia XH, Ren K et al (2013) DAC-MACS: Effective data access control for multi-authority cloud storage systems. IEEE Transactions on Information Forensics and Security, Information Security 8(11):87–99
Padhya M, Jinwala D (2014) A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy. Volume 8880 of the series Lecture Notes in Computer Science, Information Systems Security 167-184
Miyaji A, Phuong VX (2012) Constant-ciphertext-size dual policy attribute based encryption. Volume 7672 of the series Lecture Notes in Computer Science, Cyberspace Safety and Security 400-413
Cheng Y, Wang ZY (2013) Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage. Journal of Zhejiang University SCIENCE C 14(2):85–97
Qiu S, Liu JQ, Shi YF et al (2017) Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Volume 8880 of the series Lecture Notes in Computer Science. Inf Syst Secur 60:052105
Hong H, Sun Z (2018) Achieving secure data access control and efficient key updating in mobile multimedia sensor networks. Multimedia Tools and Applications 77(4):4477–4490
Hong H, Sun Z (2016) High efficient key-insulated attribute based encryption scheme without bilinear pairing operations. Springerplus 5
Lin Q, Li J, Huang Z, Chen W, Shen J A short linearly homomorphic proxy signature scheme. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2809684
Acknowledgements
This research is supported by the National Natural Science Foundation of China (61373135, 61672299).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing Interest
The authors declare that they have no competing financial interests.
Rights and permissions
About this article
Cite this article
Hong, H., Liu, X. & Sun, Z. A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems. Mobile Netw Appl 26, 2509–2514 (2021). https://doi.org/10.1007/s11036-018-1102-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-018-1102-3