Ciphertext retrieval via attribute-based FHE in cloud computing

In order to ensure the security of users’ information effectively, this paper investigates ciphertext-based attribute encryption. Homomorphic encryption can settle the problems of data privacy in cloud environments, in the way that can be operated directly to achieve the same result as for plaintext operations. In this paper, on the premise of attribute encryption, we propose an attribute-based fully homomorphism encryption scheme with LSSS matrix and a ciphertext-based retrieval scheme on this basis. Firstly, the retrieval scheme supports fine-grained cum flexible access control along with “Query-Response” mechanism to enable users to efficiently retrieve desired data from cloud servers. Secondly, the scheme supports considerable flexibility to revoke system privileges from users without updating the key client, which reduces the burden of the client greatly. Security analysis shows that the scheme can resist collusion attack. A comparison of the performance with existing CP-ABE schemes indicates that our scheme reduces the computation cost greatly for users and guarantees only the owners of the evaluation keys can perform ciphertext retrieval, which is also one of the main advantages of the proposed scheme.

[1]  B. B. Gupta,et al.  Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain , 2017, Multimedia Tools and Applications.

[2]  Frederik Vercauteren,et al.  Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.

[3]  Jian Shen,et al.  Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..

[4]  Ruchika Asija,et al.  Healthcare SaaS Based on a Data Model with Built-In Security and Privacy , 2016, Int. J. Cloud Appl. Comput..

[5]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[6]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[7]  Tang Dian-hu Fully homomorphic encryption scheme from RLWE , 2014 .

[8]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[9]  Kamel Mohamed Faraoun,et al.  Detection and Ignoring of Blackhole Attack in Vanets Networks , 2016, Int. J. Cloud Appl. Comput..

[10]  Craig Gentry,et al.  Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.

[11]  Ugrasen Suman,et al.  Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent from XSS Attack , 2016, Int. J. Cloud Appl. Comput..

[12]  Latifa Ben Arfa Rabai,et al.  A Security Framework for Secure Cloud Computing Environments , 2016, Int. J. Cloud Appl. Comput..

[13]  Craig Gentry,et al.  (Leveled) Fully Homomorphic Encryption without Bootstrapping , 2014, ACM Trans. Comput. Theory.

[14]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[15]  Siu-Ming Yiu,et al.  Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..

[16]  Avi Wigderson,et al.  On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.

[17]  Kui Ren,et al.  Attribute-based fine-grained access control with efficient revocation in cloud storage systems , 2013, ASIA CCS '13.

[18]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[19]  Jin Li,et al.  Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.

[20]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[21]  Zvika Brakerski,et al.  Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.

[22]  Jin Li,et al.  Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..

[23]  Xiaomin Wang,et al.  A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service , 2018, IEEE Access.

[24]  Dharma P. Agrawal,et al.  Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .

[25]  Jin Li,et al.  New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.

[26]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[27]  Junbeom Hur,et al.  Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.

[28]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..

[29]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[30]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[31]  Jianfeng Ma,et al.  Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.

[32]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[33]  Xuan Li,et al.  Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network , 2018, Cluster Computing.

[34]  Xuan Li,et al.  Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram , 2017, Multimedia Tools and Applications.

[35]  Ibtihal Mouhib,et al.  Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing Environment , 2017, Int. J. Cloud Appl. Comput..

[36]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[37]  Witawas Srisa-an,et al.  Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.

[38]  Dong Kun Noh,et al.  Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.

[39]  Allison Bishop,et al.  Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.

[40]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.