Skip to main content

An Efficient and Anonymous KP-ABE Scheme with Keyword Search

  • Conference paper
  • First Online:
  • 1598 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 514))

Abstract

In order to enhance the privacy preserving mechanism of cloud storage scheme and promote the cloud storage system in the enterprise, we propose a cloud storage scheme with multiple encryptions. The scheme adopts hybrid cloud structure and supports the direct revocation of users. The private cloud provided by the enterprise not only protects the attribute privacy in the access policy but achieves the pre-decryption mechanism reducing the decryption overhead for users. We introduce the identity authentication mechanism in the scheme and protect the users’ identity though the homomorphic encryption over integers. Based on the Decisional Linear assumption and the integer approximate Greatest Common Divisor problem, the proposed scheme is secure in the random oracle model. The analysis shows that our scheme is more secure and practical.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Feng T, Yin XY (2016) Research on privacy preserving mechanism of attribute-based encryption cloud storage. Chin J Netw Inf Secur 2(7):8–17

    Google Scholar 

  2. Xiong AP, Gan QX, He XX et al (2013) A searchable encryption of CP-ABE scheme in cloud storage. In: International computer conference on wavelet active media technology and information processing, pp 345–349

    Google Scholar 

  3. Wang Q, Zhu Y, Luo X (2015) Multi-user searchable encryption with coarser-grained access control without key sharing. In: International conference on cloud computing and big data. IEEE, pp 119–125

    Google Scholar 

  4. Kaci A, Bouabana-Tebibel T (2015) Access control reinforcement over searchable encryption. In: IEEE international conference on information reuse and integration. IEEE, pp 130–137

    Google Scholar 

  5. Han F, Qin J, Zhao H et al (2012) A general transformation from KP-ABE to searchable encryption. In: Cyberspace safety and security. Springer, Berlin, Heidelberg, pp 107–115

    Google Scholar 

  6. Zheng Q, Xu S, Ateniese G (2015) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. IEEE INFOCOM. IEEE, pp 522–530

    Google Scholar 

  7. Liu P, Wang J, Ma H et al (2015) Efficient verifiable public key encryption with keyword search based on KP-ABE. In: Ninth international conference on broadband and wireless computing, communication and applications. IEEE, pp 584–589

    Google Scholar 

  8. Zhu H, Wang L, Ahmad H et al (2017) Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access 99:1–1

    Google Scholar 

  9. Meiyun LI, Jian LI, Huang Chao (2012) A credible cloud storage platform based on homomorphic encryption. Netinfo Secur 12(9):35–40

    Google Scholar 

Download references

Acknowledgements

This study was supported by the National Natural Science Foundation of China (No. 61462060, No. 61562059), Regional Science Foundation Project (No. 61762060).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Tao Feng , Xiaoyu Yin or Chunyan Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Feng, T., Yin, X., Liu, C. (2019). An Efficient and Anonymous KP-ABE Scheme with Keyword Search. In: Kim, K., Baek, N. (eds) Information Science and Applications 2018. ICISA 2018. Lecture Notes in Electrical Engineering, vol 514. Springer, Singapore. https://doi.org/10.1007/978-981-13-1056-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1056-0_26

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1055-3

  • Online ISBN: 978-981-13-1056-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics