Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
In order to ensure the confidentiality and secure sharing of speech data, and to solve the problems of slow deployment of attribute encryption systems and fine-grained access control in cloud storage, a speech encryption scheme based on ciphertext policy hierarchical attributes was proposed. First,...
Guardado en:
Autores principales: | , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Hindawi-Wiley
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/ff331ec7b39647c2a99e444f19987eef |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:ff331ec7b39647c2a99e444f19987eef |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:ff331ec7b39647c2a99e444f19987eef2021-11-08T02:35:49ZSpeech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage1939-012210.1155/2021/9606240https://doaj.org/article/ff331ec7b39647c2a99e444f19987eef2021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/9606240https://doaj.org/toc/1939-0122In order to ensure the confidentiality and secure sharing of speech data, and to solve the problems of slow deployment of attribute encryption systems and fine-grained access control in cloud storage, a speech encryption scheme based on ciphertext policy hierarchical attributes was proposed. First, perform hierarchical processing of the attributes of the speech data to reflect the hierarchical structure and integrate the hierarchical access structure into a single-access structure. Second, use the attribute fast encryption framework to construct the attribute encryption scheme of the speech data, and use the integrated access to the speech data; thus, the structure is encrypted and uploaded to the cloud for storage and sharing. Finally, use the hardness of decisional bilinear Diffie–Hellman (DBDH) assumption to prove that the proposed scheme is secure in the random oracle model. The theoretical security analysis and experimental results show that the proposed scheme can achieve efficient and fine-grained access control and is secure and extensible.Qiuyu ZhangZhenyu ZhaoMinrui FuHindawi-WileyarticleTechnology (General)T1-995Science (General)Q1-390ENSecurity and Communication Networks, Vol 2021 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Technology (General) T1-995 Science (General) Q1-390 |
spellingShingle |
Technology (General) T1-995 Science (General) Q1-390 Qiuyu Zhang Zhenyu Zhao Minrui Fu Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage |
description |
In order to ensure the confidentiality and secure sharing of speech data, and to solve the problems of slow deployment of attribute encryption systems and fine-grained access control in cloud storage, a speech encryption scheme based on ciphertext policy hierarchical attributes was proposed. First, perform hierarchical processing of the attributes of the speech data to reflect the hierarchical structure and integrate the hierarchical access structure into a single-access structure. Second, use the attribute fast encryption framework to construct the attribute encryption scheme of the speech data, and use the integrated access to the speech data; thus, the structure is encrypted and uploaded to the cloud for storage and sharing. Finally, use the hardness of decisional bilinear Diffie–Hellman (DBDH) assumption to prove that the proposed scheme is secure in the random oracle model. The theoretical security analysis and experimental results show that the proposed scheme can achieve efficient and fine-grained access control and is secure and extensible. |
format |
article |
author |
Qiuyu Zhang Zhenyu Zhao Minrui Fu |
author_facet |
Qiuyu Zhang Zhenyu Zhao Minrui Fu |
author_sort |
Qiuyu Zhang |
title |
Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage |
title_short |
Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage |
title_full |
Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage |
title_fullStr |
Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage |
title_full_unstemmed |
Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage |
title_sort |
speech encryption scheme based on ciphertext policy hierarchical attribute in cloud storage |
publisher |
Hindawi-Wiley |
publishDate |
2021 |
url |
https://doaj.org/article/ff331ec7b39647c2a99e444f19987eef |
work_keys_str_mv |
AT qiuyuzhang speechencryptionschemebasedonciphertextpolicyhierarchicalattributeincloudstorage AT zhenyuzhao speechencryptionschemebasedonciphertextpolicyhierarchicalattributeincloudstorage AT minruifu speechencryptionschemebasedonciphertextpolicyhierarchicalattributeincloudstorage |
_version_ |
1718443250896863232 |