• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Yue, Fan Kai. Effective CP-ABE with Hidden Access Policy[J]. Journal of Computer Research and Development, 2019, 56(10): 2151-2159. DOI: 10.7544/issn1000-1239.2019.20190343
Citation: Wang Yue, Fan Kai. Effective CP-ABE with Hidden Access Policy[J]. Journal of Computer Research and Development, 2019, 56(10): 2151-2159. DOI: 10.7544/issn1000-1239.2019.20190343

Effective CP-ABE with Hidden Access Policy

More Information
  • Published Date: September 30, 2019
  • The development of artificial intelligence depends on the development of cloud computing, at the same time, the security of artificial intelligence is closely related to the security of large data in the cloud. At Present, the ciphertext policy attribute-based encryption (CP-ABE) scheme is considered to be one of the most effective methods to achieve fine-grained access control of data in cloud. In the CP-ABE scheme, the access policy is often associated with the ciphertext. But sometimes, the access policy itself is also the important sensitive information, and access policies stored in the cloud in the form of clear text will also cause the users’ data revealed. In response to this problem, an efficient improved CP-ABE scheme is presented, which can hide the access policy. It can make both the attribute hiding and the secret sharing be applied to the AND-gate structure at the same time and then according to the composite order bilinear groups. Therefore, the user’s specific attribute value will not be disclosed to any other third party, thus we effectively protect the user’s privacy. In addition, through the experimental verification and data analysis, our scheme not only achieves the hidden of complex access structure,but also makes the ciphertext time shortened and decryption efficiency improved.
  • Related Articles

    [1]Dai Hua, Yang Geng, Xiao Fu, Zhou Qiang, He Ruiliang. An Energy-Efficient and Privacy-Preserving Range Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(4): 983-993. DOI: 10.7544/issn1000-1239.2015.20140066
    [2]Chen Wei, Xu Ruomei, Li Yuling. A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing[J]. Journal of Computer Research and Development, 2014, 51(12): 2585-2592. DOI: 10.7544/issn1000-1239.2014.20140666
    [3]Ouyang Jia, Yin Jian, Liu Shaopeng, Liu Yubao. An Effective Differential Privacy Transaction Data Publication Strategy[J]. Journal of Computer Research and Development, 2014, 51(10): 2195-2205. DOI: 10.7544/issn1000-1239.2014.20130824
    [4]Xue Kaiping, Zhu Bin, Hong Peilin, and Lu Hancheng. An Energy Efficient Scheduling Mechanism for Real-time Services in 802.16e[J]. Journal of Computer Research and Development, 2011, 48(9): 1608-1615.
    [5]Fu Xiong, Wang Ruchuan, and Deng Song. An EnergyEfficient Data Storage Method in Wireless Sensor Network[J]. Journal of Computer Research and Development, 2009, 46(12): 2111-2116.
    [6]Ni Weiwei, Xu Lizhen, Chong Zhihong, Wu Yingjie, Liu Tengteng, and Sun Zhihui. A Privacy-Preserving Data Perturbation Algorithm Based on Neighborhood Entropy[J]. Journal of Computer Research and Development, 2009, 46(3): 498-504.
    [7]Wang Dashan, Huang Liusheng, Xu Hongli, Wu Junmin, Zhang Junxia. Wireless Sensor Network Energy-Efficient Placement Algorithm Based on Vector[J]. Journal of Computer Research and Development, 2008, 45(4): 626-635.
    [8]Sun Dayang, Liu Yanheng, Wang Aimin. An Aggregation Tree Constructing Algorithm Based on Energy Consumption Assessment[J]. Journal of Computer Research and Development, 2008, 45(1): 104-109.
    [9]Liu Xin, Wang Quanyu, and Jin Xuliang. An Energy-Aware Data Gathering and Routing Protocol for WSN[J]. Journal of Computer Research and Development, 2008, 45(1): 83-89.
    [10]Luo Yuhong, Chen Songqiao, and Wang Jianxin. An Algorithm Based on Mobility Prediction and Probability for Energy-Efficient Multicasting in Ad Hoc Networks[J]. Journal of Computer Research and Development, 2006, 43(2): 231-237.

Catalog

    Article views (2224) PDF downloads (570) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return