Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage

In order to ensure the confidentiality and secure sharing of speech data, and to solve the problems of slow deployment of attribute encryption systems and fine-grained access control in cloud storage, a speech encryption scheme based on ciphertext policy hierarchical attributes was proposed. First,...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Qiuyu Zhang, Zhenyu Zhao, Minrui Fu
Formato: article
Lenguaje:EN
Publicado: Hindawi-Wiley 2021
Materias:
Acceso en línea:https://doaj.org/article/ff331ec7b39647c2a99e444f19987eef
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:ff331ec7b39647c2a99e444f19987eef
record_format dspace
spelling oai:doaj.org-article:ff331ec7b39647c2a99e444f19987eef2021-11-08T02:35:49ZSpeech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage1939-012210.1155/2021/9606240https://doaj.org/article/ff331ec7b39647c2a99e444f19987eef2021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/9606240https://doaj.org/toc/1939-0122In order to ensure the confidentiality and secure sharing of speech data, and to solve the problems of slow deployment of attribute encryption systems and fine-grained access control in cloud storage, a speech encryption scheme based on ciphertext policy hierarchical attributes was proposed. First, perform hierarchical processing of the attributes of the speech data to reflect the hierarchical structure and integrate the hierarchical access structure into a single-access structure. Second, use the attribute fast encryption framework to construct the attribute encryption scheme of the speech data, and use the integrated access to the speech data; thus, the structure is encrypted and uploaded to the cloud for storage and sharing. Finally, use the hardness of decisional bilinear Diffie–Hellman (DBDH) assumption to prove that the proposed scheme is secure in the random oracle model. The theoretical security analysis and experimental results show that the proposed scheme can achieve efficient and fine-grained access control and is secure and extensible.Qiuyu ZhangZhenyu ZhaoMinrui FuHindawi-WileyarticleTechnology (General)T1-995Science (General)Q1-390ENSecurity and Communication Networks, Vol 2021 (2021)
institution DOAJ
collection DOAJ
language EN
topic Technology (General)
T1-995
Science (General)
Q1-390
spellingShingle Technology (General)
T1-995
Science (General)
Q1-390
Qiuyu Zhang
Zhenyu Zhao
Minrui Fu
Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
description In order to ensure the confidentiality and secure sharing of speech data, and to solve the problems of slow deployment of attribute encryption systems and fine-grained access control in cloud storage, a speech encryption scheme based on ciphertext policy hierarchical attributes was proposed. First, perform hierarchical processing of the attributes of the speech data to reflect the hierarchical structure and integrate the hierarchical access structure into a single-access structure. Second, use the attribute fast encryption framework to construct the attribute encryption scheme of the speech data, and use the integrated access to the speech data; thus, the structure is encrypted and uploaded to the cloud for storage and sharing. Finally, use the hardness of decisional bilinear Diffie–Hellman (DBDH) assumption to prove that the proposed scheme is secure in the random oracle model. The theoretical security analysis and experimental results show that the proposed scheme can achieve efficient and fine-grained access control and is secure and extensible.
format article
author Qiuyu Zhang
Zhenyu Zhao
Minrui Fu
author_facet Qiuyu Zhang
Zhenyu Zhao
Minrui Fu
author_sort Qiuyu Zhang
title Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
title_short Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
title_full Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
title_fullStr Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
title_full_unstemmed Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
title_sort speech encryption scheme based on ciphertext policy hierarchical attribute in cloud storage
publisher Hindawi-Wiley
publishDate 2021
url https://doaj.org/article/ff331ec7b39647c2a99e444f19987eef
work_keys_str_mv AT qiuyuzhang speechencryptionschemebasedonciphertextpolicyhierarchicalattributeincloudstorage
AT zhenyuzhao speechencryptionschemebasedonciphertextpolicyhierarchicalattributeincloudstorage
AT minruifu speechencryptionschemebasedonciphertextpolicyhierarchicalattributeincloudstorage
_version_ 1718443250896863232