Skip to main content
Log in

A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Attribute based encryption is suitable for data protection in data outsourcing systems such as cloud computing. However, the leveraging of encryption technique may retrain some routine operations over the encrypted data, particularly in the field of data retrieval. This paper presents an attribute based date retrieval with proxy re-encryption (ABDR-PRE) to provide both fine-grained access control and retrieval over the ciphertexts. The proposed scheme achieves fine-grained data access management by adopting KP-ABE mechanism, a delegator can generate the re-encryption key and search indexes for the ciphertexts to be shared over the target delegatee’s attributes. Throughout the process of data sharing, the data are transferred as ciphers thus the server and unauthorized users cannot acquire the sensitive information of the encrypted data so the privacy and confidentiality can be protected. By security analysis, the proposed scheme meets the security requirements confidentiality, keyword semantic security as well as collusion attack resistance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Li J, Liu Z, Chen X, Tan X, Wong DS (2015) L-EncDB: A Lightweight Framework for Privacy-Preserving Data Queries in Cloud Computing. Knowl-Based Syst 79:18–26

    Article  Google Scholar 

  2. Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the Protection for Data Security under Selective Opening Attacks. Inf Sci 412–413:223–241

    Article  Google Scholar 

  3. Bhuiyan MZA, Wu J, Wang G, Chen Z, Chen J, Wang T (April 2017) Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks. IEEE Transactions on Industrial Informatics 13(2):572–583

    Article  Google Scholar 

  4. Bhuiyan MZA, Wu J, Wang G, Cao J (2016) Sensing and Decision-making in Cyber-Physical Systems: The Case of Structural Health Monitoring. IEEE Transactions on Industrial Informatics 12(6):2103–2114

    Article  Google Scholar 

  5. Liu X, Choo K-KR, Deng RH, Lu R, Weng J (2018) Efficient and Privacy-Preserving Outsourced Computation of Rational Numbers. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC) 15(1):27–39. https://doi.org/10.1109/TDSC.2016.2536601

    Article  Google Scholar 

  6. Liu X, Deng RH, Choo K-KR (2018) Privacy-Preserving Outsourced Calculation Toolkit in the Cloud. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC). https://doi.org/10.1109/TDSC.2018.2816656

  7. Hong H, Sun Z, Liu X (2017) Provably secure attribute based signcryption with delegated computation and efficient key updating. KSII Transactions on Internet and Information Systems 11(5):2646–2659

    Google Scholar 

  8. Liu Z, Huang Y, Li J (2018) DivORAM: Towards a Practical Oblivious RAM with Variable Block Size. Inf Sci 447:1–11

    Article  Google Scholar 

  9. Xu J, Wei L, Yu Z (April 2018) Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures. Volume 107(1):113–124

    Google Scholar 

  10. Sahai A, Waters B (2005) Fuzzy identity-based encryption. Advances in Cryptology-EUROCRYPT:457–473

  11. Goyal Y, Pandey O, Sahai A, et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications. Security 89-98

  12. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy 2007:321–334

    Google Scholar 

  13. Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Public Key Cryptography-PKC 2011:53–70

    MathSciNet  MATH  Google Scholar 

  14. Li LF, Chen XW, Jiang H et al (2016) P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for clouds. 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 575-580

  15. Reedy BE, Ramu GH (2016) A Secure Framework for Ensuring EHR's Integrity Using Fine-Grained Auditing and CP-ABE. 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS): 85-89

  16. Liu Z, Wong DS (2015) Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe”. Volume 9092 of the series Lecture Notes in Computer Science, Applied Cryptography and Network Security 127-146

  17. Yang K, Jia XH, Ren K et al (2013) DAC-MACS: Effective data access control for multi-authority cloud storage systems. IEEE Transactions on Information Forensics and Security, Information Security 8(11):87–99

    Google Scholar 

  18. Padhya M, Jinwala D (2014) A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy. Volume 8880 of the series Lecture Notes in Computer Science, Information Systems Security 167-184

  19. Miyaji A, Phuong VX (2012) Constant-ciphertext-size dual policy attribute based encryption. Volume 7672 of the series Lecture Notes in Computer Science, Cyberspace Safety and Security 400-413

  20. Cheng Y, Wang ZY (2013) Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage. Journal of Zhejiang University SCIENCE C 14(2):85–97

    Article  Google Scholar 

  21. Qiu S, Liu JQ, Shi YF et al (2017) Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Volume 8880 of the series Lecture Notes in Computer Science. Inf Syst Secur 60:052105

    Google Scholar 

  22. Hong H, Sun Z (2018) Achieving secure data access control and efficient key updating in mobile multimedia sensor networks. Multimedia Tools and Applications 77(4):4477–4490

    Article  MathSciNet  Google Scholar 

  23. Hong H, Sun Z (2016) High efficient key-insulated attribute based encryption scheme without bilinear pairing operations. Springerplus 5

  24. Lin Q, Li J, Huang Z, Chen W, Shen J A short linearly homomorphic proxy signature scheme. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2809684

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China (61373135, 61672299).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hanshu Hong.

Ethics declarations

Competing Interest

The authors declare that they have no competing financial interests.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hong, H., Liu, X. & Sun, Z. A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems. Mobile Netw Appl 26, 2509–2514 (2021). https://doi.org/10.1007/s11036-018-1102-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-018-1102-3

Keywords

Navigation