Computer Science ›› 2018, Vol. 45 ›› Issue (7): 162-166.doi: 10.11896/j.issn.1002-137X.2018.07.028

• Information Security • Previous Articles     Next Articles

Attribute-based Proxy Re-encryption Technology and Fault-tolerant Mechanism Based Data Retrieval Scheme

LIU Xin-yu1,LI Lang1,XIAO Bing-bing2   

  1. College of Computer Science and Technology,Hengyang Normal University,Hengyang,Hunan 421002,China1;
    College of Information Science and Technology,Jinan University,Guangzhou 510632,China2
  • Received:2017-02-08 Online:2018-07-30 Published:2018-07-30

Abstract: Aiming at the privacy of user information stored in the cloud server problem,a scheme based on property broker re-encryption and fault-tolerant mechanism was proposed.This scheme mainly divides the data stored by users into files and the security index of files,encrypts them separately and then stores them on different cloud servers.Firstly,the security index of file is constructed by using the inverted structure and the keywords are preprocessed by using the fuzzy extractor,so the users can search multi-keywords with fault tolerance through the security index.Secondly,the access control tree is used for re-encryption ofdecryption key to realize right management,namely,the effective sharing of data in cloud.Finally,the scheme is proved to be secure in cloud environment through Complex Triple Diffie-Hellman problem,proving that the system master key generated by this scheme is secure.Compared with the existing schemes,it is shown that the scheme can reduce the computational complexity of key re-encryption and decryption,and the fault-tolerant mechanism improves the efficiency of data retrieval.

Key words: Access control tree, Fault-tolerant mechanism, Fuzzy extractors, Multiple keywords, Re-encryption technology

CLC Number: 

  • TP309
[1]HOHENBERGER S,WATERS B.Attribute-based encryptionwith fast decryption.Berlin:Springer,2013:162-179.
[2]ATTRAPADUNG N,HERRANZ J,LAGUILLAUMIE F,etal.Attribute-based encryption schemes with constant-size ciphertexts.Theoretical Computer Science,2012,422(3):15-38.
[3]KHADER D.Introduction to attribute based searchable encryption[M]∥Communications and Multimedia Security.Springer Berlin Heidelberg,2014:131-135.
[4]LI M,YU S,ZHENG Y,et al.Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE Transactions on Parallel and Distributed Systems,2013,24(1):131-143.
[5]GOLLE P,STADDON J,WATERS B.Secure conjunctive keyword search over encrypted data[C]∥Proc of the applied Cryptography and Network Security.Springer Berlin Heidelberg,2004:31-45.
[6]CAO N,WANG C,LI M,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data.IEEE Transa-ctions on Parallel and Distributed Systems,2014,25(1):222-233.
[7]SUN W,WANG B,CAO N,et al.Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ran-king[C]∥Proc of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security.ACM,2013:71-82.
[8]CURTMOLA R,GARAY J,KAMARA S,et al.Searchablesymmetric encryption:Improved definitions and efficient constructions.Journal of Computer Security,2011,19(5):895-934.
[9]GOLLE P,STADDON J,WATERS B.Secure Conjunctive Keyword Search over Encrypted Data.Berlin:Springer,2004:31-45.
[10]KAMARA S,PAPAMANTHOU C,ROEDER T.Dynamic sea-rchable symmetric encryption[C]∥Acm Conference on Computer & Communications Security.ACM,2012:965-976.
[11]KAMARA S,PAPAMANTHOU C.Parallel and Dynamic Searchable Symmetric Encryption∥Berlin:Springer,2013:258-274.
[12]CASH D,JARECKI S,JUTLA C,et al.Highly-Scalable Searcha-ble Symmetric Encryption with Support for Boolean Queries.Berlin:Springer,2013:353-373.
[13]AU M H,TSANG P P,SUSILO W,et al.Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems.Berlin:Springer,2009:295-308.
[14]SHAO J,CAO Z,LIANG X,et al.Proxy re-encryption withkeyword search.Information Sciences,2010,180(13):2576-2587.
[15]LEE S H,LEE I Y.A Study of Practical Proxy Reencryptionwith a Keyword Search Scheme considering Cloud Storage Structure.The Scientific World Journal,2014,2014(2):1661-1667.
[16]FANG L,SUSILO W,GE C,et al.Chosen-ciphertext secureanonymous conditional proxy re-encryption with keyword search.Theoretical Computer Science,2012,4629(1):39-58.
[17]DODIS Y,OSTROVSKY R,REYZIN L,et al.Fuzzy extractors:How to generate strong keys from biometrics and other noisy data.SIAM Journal on Computing,2008,38(1):97-139.
[1] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
[2] TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305.
[3] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[4] LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325.
[5] DOU Jia-wei. Privacy-preserving Hamming and Edit Distance Computation and Applications [J]. Computer Science, 2022, 49(9): 355-360.
[6] GAO Chun-gang, WANG Yong-jie, XIONG Xin-li. MTDCD:A Hybrid Defense Mechanism Against Network Intrusion [J]. Computer Science, 2022, 49(7): 324-331.
[7] LIANG Zhen-zhen, XU Ming. Key Agreement Scheme Based on Ocean Acoustic Channel [J]. Computer Science, 2022, 49(6): 356-362.
[8] DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284.
[9] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[10] WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473.
[11] LIANG Yi-wen, DU Yu-song. Timing Attack Resilient Sampling Algorithms for Binary Gaussian Based on Knuth-Yao [J]. Computer Science, 2022, 49(6A): 485-489.
[12] YAN Meng, LIN Ying, NIE Zhi-shen, CAO Yi-fan, PI Huan, ZHANG Lan. Training Method to Improve Robustness of Federated Learning [J]. Computer Science, 2022, 49(6A): 496-501.
[13] CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543.
[14] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[15] LIU Lin-yun, CHEN Kai-yan, LI Xiong-wei, ZHANG Yang, XIE Fang-fang. Overview of Side Channel Analysis Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(5): 296-302.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!