Data Querying with Ciphertext Policy Attribute Based Encryption

09/29/2022
by   Maryam Almarwani, et al.
0

Data encryption limits the power and efficiency of queries. Direct processing of encrypted data should ideally be possible to avoid the need for data decryption, processing, and re-encryption. It is vital to keep the data searchable and sortable. That is, some information is intentionally leaked. This intentional leakage technology is known as "querying over encrypted data schemes", which offer confidentiality as well as querying over encrypted data, but it is not meant to provide flexible access control. This paper suggests the use of Ciphertext Policy Attributes Based Encryption (CP-ABE) to address three security requirements, namely: confidentiality, queries over encrypted data, and flexible access control. By combining flexible access control and data confidentiality, CP-ABE can authenticate who can access data and possess the secret key. Thus, this paper identifies how much data leakage there is in order to figure out what kinds of operations are allowed when data is encrypted by CP-ABE.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/13/2018

On the security of the hierarchical attribute based encryption scheme proposed by Wang et al

Ciphertext-policy hierarchical attribute-based encryption (CP-HABE) is a...
research
03/10/2021

Equi-Joins Over Encrypted Data for Series of Queries

Encryption provides a method to protect data outsourced to a DBMS provid...
research
06/08/2018

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

Most encrypted data formats, such as PGP, leak substantial metadata in t...
research
06/11/2021

A survey on Functional Encryption

Functional Encryption (FE) expands traditional public-key encryption in ...
research
03/13/2020

ShieldDB: An Encrypted Document Database with Padding Countermeasures

The security of our data stores is underestimated in current practice, w...
research
02/10/2021

Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets

This paper proposes a system, entitled Concealer that allows sharing tim...
research
04/30/2020

Cloud+: A safe and restrained data access control program for cloud

Secure distributed storage, which is a rising cloud administration, is p...

Please sign up or login with your details

Forgot password? Click here to reset