Reference Hub1
Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption

Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption

G. Sravan Kumar, A. Sri Krishna
ISBN13: 9781799877059|ISBN10: 1799877051|EISBN13: 9781799877486
DOI: 10.4018/978-1-7998-7705-9.ch064
Cite Chapter Cite Chapter

MLA

Kumar, G. Sravan, and A. Sri Krishna. "Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption." Research Anthology on Artificial Intelligence Applications in Security, edited by Information Resources Management Association, IGI Global, 2021, pp. 1431-1447. https://doi.org/10.4018/978-1-7998-7705-9.ch064

APA

Kumar, G. S. & Krishna, A. S. (2021). Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption. In I. Management Association (Ed.), Research Anthology on Artificial Intelligence Applications in Security (pp. 1431-1447). IGI Global. https://doi.org/10.4018/978-1-7998-7705-9.ch064

Chicago

Kumar, G. Sravan, and A. Sri Krishna. "Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption." In Research Anthology on Artificial Intelligence Applications in Security, edited by Information Resources Management Association, 1431-1447. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-7705-9.ch064

Export Reference

Mendeley
Favorite

Abstract

Cloud data storage environments allow the data providers to store and share large amounts of datasets generated from various resources. However, outsourcing private data to a cloud server is insecure without an efficient access control strategy. Thus, it is important to protect the data and privacy of user with a fine-grained access control policy. In this article, a Bloom Filter-based Ciphertext-Policy Attribute-Based Encryption (BF-CP-ABE) technique is presented to provide data security to cloud datasets with a Linear Secret Sharing Structure (LSSS) access policy. This fine-grained access control scheme hides the whole attribute set in the ciphertext, whereas in previous CP-ABE methods, the attributes are partially hidden in the ciphertext which in turn leaks private information about the user. Since the attribute set of the BF-CP-ABE technique is hidden, bloom filters are used to identify the authorized users during data decryption. The BF-CP-ABE technique is designed to be selective secure under an Indistinguishable-Chosen Plaintext attack and the simulation results show that the communication overhead is significantly reduced with the adopted LSSS access policy.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.