Data Rights Confirmation Scheme Based on Auditable Ciphertext CP-ABE in the Cloud Storage Environment
Advances in information technology have made data accessible anytime and anywhere. Currently, data confirmation is a popular area of research. Many current approaches to data confirmation rely on submitting certificates of ownership, embedding digital watermarks, or using blockchain. However, none o...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-03-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/13/7/4355 |
_version_ | 1797608339036700672 |
---|---|
author | Lingyun Zhang Yuling Chen Yun Luo Zhongxiang He Tao Li |
author_facet | Lingyun Zhang Yuling Chen Yun Luo Zhongxiang He Tao Li |
author_sort | Lingyun Zhang |
collection | DOAJ |
description | Advances in information technology have made data accessible anytime and anywhere. Currently, data confirmation is a popular area of research. Many current approaches to data confirmation rely on submitting certificates of ownership, embedding digital watermarks, or using blockchain. However, none of these approaches can avoid exposing source data to third parties that are not fully trusted. To address this issue, this paper proposes a new data confirmation method based on ciphertext policy attribute-based encryption (CP-ABE), which is widely used in cloud storage environments. The unique identifier of the data owner is encrypted by Paillier encryption and embedded into the ciphertext, so that the ownership corresponding to the plaintext is converted to the ownership corresponding to the ciphertext. During the entire confirmation process, third-party organizations cannot access the source data, reducing the risk of source data leakage. Finally, the feasibility of the scheme is proved by security proof and experiment comparison. |
first_indexed | 2024-03-11T05:43:04Z |
format | Article |
id | doaj.art-9112b5bd279847198503cee0d6ac69a1 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-11T05:43:04Z |
publishDate | 2023-03-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-9112b5bd279847198503cee0d6ac69a12023-11-17T16:19:10ZengMDPI AGApplied Sciences2076-34172023-03-01137435510.3390/app13074355Data Rights Confirmation Scheme Based on Auditable Ciphertext CP-ABE in the Cloud Storage EnvironmentLingyun Zhang0Yuling Chen1Yun Luo2Zhongxiang He3Tao Li4State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550001, ChinaState Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550001, ChinaState Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550001, ChinaState Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550001, ChinaState Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550001, ChinaAdvances in information technology have made data accessible anytime and anywhere. Currently, data confirmation is a popular area of research. Many current approaches to data confirmation rely on submitting certificates of ownership, embedding digital watermarks, or using blockchain. However, none of these approaches can avoid exposing source data to third parties that are not fully trusted. To address this issue, this paper proposes a new data confirmation method based on ciphertext policy attribute-based encryption (CP-ABE), which is widely used in cloud storage environments. The unique identifier of the data owner is encrypted by Paillier encryption and embedded into the ciphertext, so that the ownership corresponding to the plaintext is converted to the ownership corresponding to the ciphertext. During the entire confirmation process, third-party organizations cannot access the source data, reducing the risk of source data leakage. Finally, the feasibility of the scheme is proved by security proof and experiment comparison.https://www.mdpi.com/2076-3417/13/7/4355CP-ABEcloud storagedata confirmationcryptographyPaillier encryption |
spellingShingle | Lingyun Zhang Yuling Chen Yun Luo Zhongxiang He Tao Li Data Rights Confirmation Scheme Based on Auditable Ciphertext CP-ABE in the Cloud Storage Environment Applied Sciences CP-ABE cloud storage data confirmation cryptography Paillier encryption |
title | Data Rights Confirmation Scheme Based on Auditable Ciphertext CP-ABE in the Cloud Storage Environment |
title_full | Data Rights Confirmation Scheme Based on Auditable Ciphertext CP-ABE in the Cloud Storage Environment |
title_fullStr | Data Rights Confirmation Scheme Based on Auditable Ciphertext CP-ABE in the Cloud Storage Environment |
title_full_unstemmed | Data Rights Confirmation Scheme Based on Auditable Ciphertext CP-ABE in the Cloud Storage Environment |
title_short | Data Rights Confirmation Scheme Based on Auditable Ciphertext CP-ABE in the Cloud Storage Environment |
title_sort | data rights confirmation scheme based on auditable ciphertext cp abe in the cloud storage environment |
topic | CP-ABE cloud storage data confirmation cryptography Paillier encryption |
url | https://www.mdpi.com/2076-3417/13/7/4355 |
work_keys_str_mv | AT lingyunzhang datarightsconfirmationschemebasedonauditableciphertextcpabeinthecloudstorageenvironment AT yulingchen datarightsconfirmationschemebasedonauditableciphertextcpabeinthecloudstorageenvironment AT yunluo datarightsconfirmationschemebasedonauditableciphertextcpabeinthecloudstorageenvironment AT zhongxianghe datarightsconfirmationschemebasedonauditableciphertextcpabeinthecloudstorageenvironment AT taoli datarightsconfirmationschemebasedonauditableciphertextcpabeinthecloudstorageenvironment |