{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T20:12:37Z","timestamp":1760472757484},"reference-count":42,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"abstract":"<jats:p>Cloud data storage environments allow the data providers to store and share large amounts of datasets generated from various resources. However, outsourcing private data to a cloud server is insecure without an efficient access control strategy. Thus, it is important to protect the data and privacy of user with a fine-grained access control policy. In this article, a Bloom Filter-based Ciphertext-Policy Attribute-Based Encryption (BF-CP-ABE) technique is presented to provide data security to cloud datasets with a Linear Secret Sharing Structure (LSSS) access policy. This fine-grained access control scheme hides the whole attribute set in the ciphertext, whereas in previous CP-ABE methods, the attributes are partially hidden in the ciphertext which in turn leaks private information about the user. Since the attribute set of the BF-CP-ABE technique is hidden, bloom filters are used to identify the authorized users during data decryption. The BF-CP-ABE technique is designed to be selective secure under an Indistinguishable-Chosen Plaintext attack and the simulation results show that the communication overhead is significantly reduced with the adopted LSSS access policy.<\/jats:p>","DOI":"10.4018\/ijisp.2019100102","type":"journal-article","created":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T14:33:27Z","timestamp":1568385207000},"page":"12-27","source":"Crossref","is-referenced-by-count":3,"title":["Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption"],"prefix":"10.4018","volume":"13","author":[{"given":"G. Sravan","family":"Kumar","sequence":"first","affiliation":[{"name":"Acharya Nagarjuna University, Guntur, India"}]},{"given":"A. Sri","family":"Krishna","sequence":"additional","affiliation":[{"name":"RVR & JC College of Engineering, Guntur, India"}]}],"member":"2432","reference":[{"key":"IJISP.2019100102-0","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_6"},{"key":"IJISP.2019100102-1","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption.","author":"J.Bethencourt","year":"2007","journal-title":"Security and Privacy IEEE Symposium"},{"key":"IJISP.2019100102-2","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"IJISP.2019100102-3","doi-asserted-by":"crossref","unstructured":"Boneh, D., & Waters, B. (2007). Conjunctive, subset, and range queries on encrypted data. In Theory of Cryptography Conference (pp. 535-554). Springer.","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"IJISP.2019100102-4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32928-9_31"},{"key":"IJISP.2019100102-5","doi-asserted-by":"publisher","DOI":"10.18831\/djcse.in\/2015021002"},{"key":"IJISP.2019100102-6","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"IJISP.2019100102-7","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-017-0462-0"},{"key":"IJISP.2019100102-8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.61"},{"key":"IJISP.2019100102-9","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60960-561-2.ch211"},{"key":"IJISP.2019100102-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.07.007"},{"key":"IJISP.2019100102-11","doi-asserted-by":"publisher","DOI":"10.18831\/djece.org\/2015021002"},{"key":"IJISP.2019100102-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.07.006"},{"key":"IJISP.2019100102-13","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/978-981-13-3600-3_30","article-title":"Privacy Sustaining Constant Length Ciphertext-Policy Attribute-Based Broadcast Encryption","author":"G. S.Kumar","year":"2019","journal-title":"Soft Computing and Signal Processing"},{"key":"IJISP.2019100102-14","doi-asserted-by":"crossref","unstructured":"Lai, J., Deng, R. H., & Li, Y. (2011). Fully secure cipertext-policy hiding CP-ABE. In Proceedings of the International conference on information security practice and experience (pp. 24-39). Springer.","DOI":"10.1007\/978-3-642-21031-0_3"},{"key":"IJISP.2019100102-15","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414465"},{"issue":"4","key":"IJISP.2019100102-16","first-page":"1404","article-title":"Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid.","volume":"9","author":"H.Li","year":"2015","journal-title":"Transactions on Internet and Information Systems (Seoul)"},{"key":"IJISP.2019100102-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.03.006"},{"key":"IJISP.2019100102-18","doi-asserted-by":"crossref","unstructured":"Liu, J., Tang, H., Li, C., Sun, R., Du, X., & Guizani, M. (2018). vFAC: Fine-Grained Access Control with Versatility for Cloud Storage. arXiv:1811.03243","DOI":"10.1109\/GLOCOM.2018.8647169"},{"key":"IJISP.2019100102-19","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1663"},{"key":"IJISP.2019100102-20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.027"},{"key":"IJISP.2019100102-21","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6863131"},{"issue":"1","key":"IJISP.2019100102-22","article-title":"Applicability of homomorphic encryption and CryptDB in social and business applications: Securing data stored on the third party servers while processing through applications.","volume":"100","author":"K.Mallaiah","year":"2014","journal-title":"International Journal of Computers and Applications"},{"key":"IJISP.2019100102-23","doi-asserted-by":"crossref","unstructured":"Nishide, T., Yoneyama, K., & Ohta, K. (2008). Attribute-based encryption with partially hidden encryptor-specified access structures. In International conference on applied cryptography and network security (pp. 111-129). Springer.","DOI":"10.1007\/978-3-540-68914-0_7"},{"key":"IJISP.2019100102-24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2475723"},{"key":"IJISP.2019100102-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2016.05.017"},{"key":"IJISP.2019100102-26","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2355202"},{"key":"IJISP.2019100102-27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894289"},{"issue":"3","key":"IJISP.2019100102-28","first-page":"413","article-title":"Cryptographically imposed model for Efficient Multiple Keyword-based Search over Encrypted Data in Cloud by Secure Index using Bloom Filter and False Random Bit Generator.","volume":"19","author":"D.Thiyagarajan","year":"2017","journal-title":"International Journal of Network Security"},{"key":"IJISP.2019100102-29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"IJISP.2019100102-30","doi-asserted-by":"publisher","DOI":"10.1504\/IJCC.2015.074224"},{"key":"IJISP.2019100102-31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.051"},{"key":"IJISP.2019100102-32","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.253"},{"key":"IJISP.2019100102-33","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2535728"},{"key":"IJISP.2019100102-34","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-4030-6.ch007"},{"key":"IJISP.2019100102-35","doi-asserted-by":"crossref","unstructured":"Yeh, L.Y., Chiang, P.Y., Tsai, Y.L., & Huang, J.L. (2018). Cloud-based fine-grained health information access control framework for lightweight IoT devices with dynamic auditing and attribute revocation. IEEE transactions on cloud computing, 6(2), 532-544.","DOI":"10.1109\/TCC.2015.2485199"},{"key":"IJISP.2019100102-36","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.130"},{"key":"IJISP.2019100102-37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.12.018"},{"key":"IJISP.2019100102-38","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484381"},{"key":"IJISP.2019100102-39","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-8213-9.ch011"},{"key":"IJISP.2019100102-40","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2330-8"},{"key":"IJISP.2019100102-41","doi-asserted-by":"crossref","unstructured":"Zhu, H., Chen, M., Sun, M., Liao, X., & Hu, L. (2018). Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing. Security and Communication Networks.","DOI":"10.1155\/2018\/5841967"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=237208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T09:58:45Z","timestamp":1651831125000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2019100102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":42,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2019100102","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}