Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing
In a multimedia cloud computing system, suppose all cloud users outsource their own data sets to the cloud in the encrypted form. Each outsourced set is associated with an access structure such that a valid data user, Bob, with the credentials satisfying the access structure is able to conduct compu...
Guardado en:
Autores principales: | , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
MDPI AG
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/f97c3f0276384105bad128a0fce024d6 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:f97c3f0276384105bad128a0fce024d6 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:f97c3f0276384105bad128a0fce024d62021-11-11T15:40:35ZCiphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing10.3390/electronics102126852079-9292https://doaj.org/article/f97c3f0276384105bad128a0fce024d62021-11-01T00:00:00Zhttps://www.mdpi.com/2079-9292/10/21/2685https://doaj.org/toc/2079-9292In a multimedia cloud computing system, suppose all cloud users outsource their own data sets to the cloud in the encrypted form. Each outsourced set is associated with an access structure such that a valid data user, Bob, with the credentials satisfying the access structure is able to conduct computing over outsourced encrypted set (e.g., decryption or other kinds of computing function). Suppose Bob needs to compute the set intersection over a data owner Alice’s and his own outsourced encrypted sets. Bob’s simple solution is to download Alice’s and Bob’s outsourced encrypted sets, perform set intersection operation, and decrypt the set intersection ciphertexts. A better solution is for Bob to delegate the cloud to calculate the set intersection, without giving the cloud any ability in breaching the secrecy of the sets. To solve this problem, this work introduces a novel primitive called <i>ciphertext-policy attribute-based encryption with outsourced set intersection</i> for multimedia cloud computing. It is the first cryptographic algorithm supporting a fully outsourced encrypted storage, computation delegation, fine-grained authorization security for ciphertext-policy model, without relying on an online trusted authority or data owners, and multi-elements set, simultaneously. We construct a scheme that provably satisfies the desirable security properties, and analyze its efficiency.Yanfeng ShiShuo QiuMDPI AGarticlePSICP-ABEoutsourced computingmultimedia cloud computingElectronicsTK7800-8360ENElectronics, Vol 10, Iss 2685, p 2685 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
PSI CP-ABE outsourced computing multimedia cloud computing Electronics TK7800-8360 |
spellingShingle |
PSI CP-ABE outsourced computing multimedia cloud computing Electronics TK7800-8360 Yanfeng Shi Shuo Qiu Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing |
description |
In a multimedia cloud computing system, suppose all cloud users outsource their own data sets to the cloud in the encrypted form. Each outsourced set is associated with an access structure such that a valid data user, Bob, with the credentials satisfying the access structure is able to conduct computing over outsourced encrypted set (e.g., decryption or other kinds of computing function). Suppose Bob needs to compute the set intersection over a data owner Alice’s and his own outsourced encrypted sets. Bob’s simple solution is to download Alice’s and Bob’s outsourced encrypted sets, perform set intersection operation, and decrypt the set intersection ciphertexts. A better solution is for Bob to delegate the cloud to calculate the set intersection, without giving the cloud any ability in breaching the secrecy of the sets. To solve this problem, this work introduces a novel primitive called <i>ciphertext-policy attribute-based encryption with outsourced set intersection</i> for multimedia cloud computing. It is the first cryptographic algorithm supporting a fully outsourced encrypted storage, computation delegation, fine-grained authorization security for ciphertext-policy model, without relying on an online trusted authority or data owners, and multi-elements set, simultaneously. We construct a scheme that provably satisfies the desirable security properties, and analyze its efficiency. |
format |
article |
author |
Yanfeng Shi Shuo Qiu |
author_facet |
Yanfeng Shi Shuo Qiu |
author_sort |
Yanfeng Shi |
title |
Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing |
title_short |
Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing |
title_full |
Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing |
title_fullStr |
Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing |
title_full_unstemmed |
Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing |
title_sort |
ciphertext-policy attribute-based encryption with outsourced set intersection in multimedia cloud computing |
publisher |
MDPI AG |
publishDate |
2021 |
url |
https://doaj.org/article/f97c3f0276384105bad128a0fce024d6 |
work_keys_str_mv |
AT yanfengshi ciphertextpolicyattributebasedencryptionwithoutsourcedsetintersectioninmultimediacloudcomputing AT shuoqiu ciphertextpolicyattributebasedencryptionwithoutsourcedsetintersectioninmultimediacloudcomputing |
_version_ |
1718434450771017728 |