Academic Journal of Computing & Information Science, 2021, 4(5); doi: 10.25236/AJCIS.2021.040505.
School of Cybersecurity, Qufu Normal University, Qufu, Jining, 272000, China
In the information era, data security is important. At first, it is an identity-based encryption mechanism and then it extends various branches and deformations. A policy combined with attribute based access control is known as Attribute Based Access Control came into existence. The two classes of Attribute based Encryption Scheme, such as CP-ABE (Ciphertext-Policy Attribute-based Encryption) and KP-ABE (Key Policy Attribute-based Encryption) concepts are utilized to data security communication system. In this paper, we build a data security communication system based on OpenABE library. We use the basic system call of network communication send() and recv() to send or receive message. Then, the OpenABE encrypts or decrypts for the message. In ABE system, the public key and private key are not one-to-one, and one public key can correspond to multiple private keys. No matter how many users share the data, it is only necessary to encrypt it once. When encrypting the information, the encryption party does not need to know who is decrypted, and the decryption party can decrypt it which only needs to meet the corresponding conditions, so as to achieve data access control while encrypting. Besides, this paper also briefly introduced the ABE and the OpenABE.
Attribute based encryption, ciphertext policy, OpenABE, attributes
Yajun Zou. Data Secure Communication System Based on OpenABE. Academic Journal of Computing & Information Science (2021), Vol. 4, Issue 5: 32-36. https://doi.org/10.25236/AJCIS.2021.040505.
 Waters B. Ciphertext-policy attribute-based encryption. 2011.
 Xingting Dong, Yanhua Zhang, Baocang Wang, Jiangshan Chen, "Server-Aided Revocable Attribute-Based Encryption from Lattices", Security and Communication Networks, vol. 2020, Article ID 1460531, 13 pages, 2020.
 Kumar, Praveen, P, et al. Attribute based encryption in cloud computing: A survey, gap analysis, and future directions [J]. Journal of Network & Computer Applications, 2018.