Data encryption limits the power and efficiency of queries. Direct processing of encrypted data should ideally be possible to avoid the need for data decryption, processing, and re-encryption. It is vital to keep the data searchable and sortable. That is, some information is intentionally leaked. This intentional leakage technology is known as "querying over encrypted data schemes", which offer confidentiality as well as querying over encrypted data, but it is not meant to provide flexible access control. This paper suggests the use of Ciphertext Policy Attributes Based Encryption (CP-ABE) to address three security requirements, namely: confidentiality, queries over encrypted data, and flexible access control. By combining flexible access control and data confidentiality, CP-ABE can authenticate who can access data and possess the secret key. Thus, this paper identifies how much data leakage there is in order to figure out what kinds of operations are allowed when data is encrypted by CP-ABE.
翻译:数据加密限制了查询的权力和效率。 加密数据的直接处理最好能够避免数据解密、处理和重新加密的需要。 保持数据可搜索和可排序至关重要。 也就是说, 一些信息是故意泄漏的。 这种故意泄漏技术被称为“ 加密数据方法的解密”, 提供保密性, 并查询加密数据, 但它并不是为了提供灵活的访问控制。 本文建议使用加密政策属性基于加密的加密( CP- ABE) 来满足三个安全要求, 即保密、 加密数据的查询和灵活的访问控制。 通过将灵活的访问控制和数据保密结合起来, CP- ABE 可以验证谁可以访问数据并拥有秘密密钥。 因此, 本文确定了有多少数据渗漏, 以便找出在CP- ABE加密数据时允许哪些类型的操作。