Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing

In a multimedia cloud computing system, suppose all cloud users outsource their own data sets to the cloud in the encrypted form. Each outsourced set is associated with an access structure such that a valid data user, Bob, with the credentials satisfying the access structure is able to conduct compu...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Yanfeng Shi, Shuo Qiu
Formato: article
Lenguaje:EN
Publicado: MDPI AG 2021
Materias:
PSI
Acceso en línea:https://doaj.org/article/f97c3f0276384105bad128a0fce024d6
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:f97c3f0276384105bad128a0fce024d6
record_format dspace
spelling oai:doaj.org-article:f97c3f0276384105bad128a0fce024d62021-11-11T15:40:35ZCiphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing10.3390/electronics102126852079-9292https://doaj.org/article/f97c3f0276384105bad128a0fce024d62021-11-01T00:00:00Zhttps://www.mdpi.com/2079-9292/10/21/2685https://doaj.org/toc/2079-9292In a multimedia cloud computing system, suppose all cloud users outsource their own data sets to the cloud in the encrypted form. Each outsourced set is associated with an access structure such that a valid data user, Bob, with the credentials satisfying the access structure is able to conduct computing over outsourced encrypted set (e.g., decryption or other kinds of computing function). Suppose Bob needs to compute the set intersection over a data owner Alice’s and his own outsourced encrypted sets. Bob’s simple solution is to download Alice’s and Bob’s outsourced encrypted sets, perform set intersection operation, and decrypt the set intersection ciphertexts. A better solution is for Bob to delegate the cloud to calculate the set intersection, without giving the cloud any ability in breaching the secrecy of the sets. To solve this problem, this work introduces a novel primitive called <i>ciphertext-policy attribute-based encryption with outsourced set intersection</i> for multimedia cloud computing. It is the first cryptographic algorithm supporting a fully outsourced encrypted storage, computation delegation, fine-grained authorization security for ciphertext-policy model, without relying on an online trusted authority or data owners, and multi-elements set, simultaneously. We construct a scheme that provably satisfies the desirable security properties, and analyze its efficiency.Yanfeng ShiShuo QiuMDPI AGarticlePSICP-ABEoutsourced computingmultimedia cloud computingElectronicsTK7800-8360ENElectronics, Vol 10, Iss 2685, p 2685 (2021)
institution DOAJ
collection DOAJ
language EN
topic PSI
CP-ABE
outsourced computing
multimedia cloud computing
Electronics
TK7800-8360
spellingShingle PSI
CP-ABE
outsourced computing
multimedia cloud computing
Electronics
TK7800-8360
Yanfeng Shi
Shuo Qiu
Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing
description In a multimedia cloud computing system, suppose all cloud users outsource their own data sets to the cloud in the encrypted form. Each outsourced set is associated with an access structure such that a valid data user, Bob, with the credentials satisfying the access structure is able to conduct computing over outsourced encrypted set (e.g., decryption or other kinds of computing function). Suppose Bob needs to compute the set intersection over a data owner Alice’s and his own outsourced encrypted sets. Bob’s simple solution is to download Alice’s and Bob’s outsourced encrypted sets, perform set intersection operation, and decrypt the set intersection ciphertexts. A better solution is for Bob to delegate the cloud to calculate the set intersection, without giving the cloud any ability in breaching the secrecy of the sets. To solve this problem, this work introduces a novel primitive called <i>ciphertext-policy attribute-based encryption with outsourced set intersection</i> for multimedia cloud computing. It is the first cryptographic algorithm supporting a fully outsourced encrypted storage, computation delegation, fine-grained authorization security for ciphertext-policy model, without relying on an online trusted authority or data owners, and multi-elements set, simultaneously. We construct a scheme that provably satisfies the desirable security properties, and analyze its efficiency.
format article
author Yanfeng Shi
Shuo Qiu
author_facet Yanfeng Shi
Shuo Qiu
author_sort Yanfeng Shi
title Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing
title_short Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing
title_full Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing
title_fullStr Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing
title_full_unstemmed Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing
title_sort ciphertext-policy attribute-based encryption with outsourced set intersection in multimedia cloud computing
publisher MDPI AG
publishDate 2021
url https://doaj.org/article/f97c3f0276384105bad128a0fce024d6
work_keys_str_mv AT yanfengshi ciphertextpolicyattributebasedencryptionwithoutsourcedsetintersectioninmultimediacloudcomputing
AT shuoqiu ciphertextpolicyattributebasedencryptionwithoutsourcedsetintersectioninmultimediacloudcomputing
_version_ 1718434450771017728