{"title":"An Efficient and Secure Data Sharing Scheme for Ciphertext-Policy Attribute-based Signcryption for Cloud Storage Services","authors":"V. Catherine, A. S. Nargunam","doi":"10.1109/I-SMAC55078.2022.9987411","DOIUrl":null,"url":null,"abstract":"In this paper, an efficient retrievable attribute with Ciphertext-policy attribute-based signcryption with accountable and verifiable outsourced designcryption (CP-ABSc-AVODs) was proposed towards enable sharing of data in cloud in a secure manner. The cloud provides accurate control on data access, encryption and authenticity to data for granting confidentiality and integrity to personal messages. This protocol enables signing of message, depending on the access privileges given in tree structure mentioned embedded with the message. Users will be able to decrypt to get plaintext if and only if they have the necessary properties satisfying the structure specified for data access. In addition, CP-ABSc-AVODs provide access policy update functionality to decrypt unsigned or signed cloud storage server messages and redistribute user secret keys. The feature of access policy update in CP-ABSc-AVODs has no effect on the number of messages or its size received at the client site and hence there is a reduction in bandwidth and memory usage. The proposed protocol includes general attack resistance, message detection, data protection and fraud prevention. In addition, the proposed method’s performance is evaluated by comparing with other methods with respect to size of the key, functionality and time required for computation.","PeriodicalId":306129,"journal":{"name":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SMAC55078.2022.9987411","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, an efficient retrievable attribute with Ciphertext-policy attribute-based signcryption with accountable and verifiable outsourced designcryption (CP-ABSc-AVODs) was proposed towards enable sharing of data in cloud in a secure manner. The cloud provides accurate control on data access, encryption and authenticity to data for granting confidentiality and integrity to personal messages. This protocol enables signing of message, depending on the access privileges given in tree structure mentioned embedded with the message. Users will be able to decrypt to get plaintext if and only if they have the necessary properties satisfying the structure specified for data access. In addition, CP-ABSc-AVODs provide access policy update functionality to decrypt unsigned or signed cloud storage server messages and redistribute user secret keys. The feature of access policy update in CP-ABSc-AVODs has no effect on the number of messages or its size received at the client site and hence there is a reduction in bandwidth and memory usage. The proposed protocol includes general attack resistance, message detection, data protection and fraud prevention. In addition, the proposed method’s performance is evaluated by comparing with other methods with respect to size of the key, functionality and time required for computation.
本文提出了一种有效的可检索属性、基于密文策略属性的签名加密和可问责和可验证的外包设计加密(cp - ab - avods),以实现云数据的安全共享。云提供对数据访问、加密和数据真实性的精确控制,以授予个人信息的机密性和完整性。该协议支持对消息进行签名,具体取决于消息中嵌入的树结构中给定的访问权限。当且仅当用户具有满足为数据访问指定的结构的必要属性时,用户才能够解密以获得明文。此外,cp - ab - avod还提供访问策略更新功能,以解密未签名或签名的云存储服务器消息,并重新分发用户秘密密钥。cp - ab - avod中的访问策略更新特性对客户端站点接收的消息的数量或大小没有影响,因此减少了带宽和内存使用。该协议包括抗一般攻击、消息检测、数据保护和防欺诈。此外,通过与其他方法在密钥大小、功能和计算时间方面的比较,对所提出方法的性能进行了评估。