Journal ArticleDOI
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
TLDR
This article provides a ciphertext-policy attribute based encryption (CP-ABE) scheme with efficient user revocation for cloud storage system that can withstand collusion attack performed by revoked users cooperating with existing users and proves the security of the scheme under the divisible computation Diffie-Hellman assumption.Abstract:
With the development of cloud computing, outsourcing data to cloud server attracts lots of attentions. To guarantee the security and achieve flexibly fine-grained file access control, attribute based encryption (ABE) was proposed and used in cloud storage system. However, user revocation is the primary issue in ABE schemes. In this article, we provide a ciphertext-policy attribute based encryption (CP-ABE) scheme with efficient user revocation for cloud storage system. The issue of user revocation can be solved efficiently by introducing the concept of user group. When any user leaves, the group manager will update users’ private keys except for those who have been revoked. Additionally, CP-ABE scheme has heavy computation cost, as it grows linearly with the complexity for the access structure. To reduce the computation cost, we outsource high computation load to cloud service providers without leaking file content and secret keys. Notably, our scheme can withstand collusion attack performed by revoked users cooperating with existing users. We prove the security of our scheme under the divisible computation Diffie-Hellman assumption. The result of our experiment shows computation cost for local devices is relatively low and can be constant. Our scheme is suitable for resource constrained devices.read more
Citations
More filters
Journal ArticleDOI
Enabling Efficient Data Sharing With Auditable User Revocation for IoV Systems
TL;DR: Wang et al. as discussed by the authors proposed an auditable user revocation for CP-ABE to adapt to the dynamic vehicle groups and leveraged online/offline and verifiable outsourcing techniques to improve the efficiency and guarantee the correctness of decryption.
Journal ArticleDOI
A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
Junsong Fu,Na Wang +1 more
TL;DR: This paper proposes a practical Ciphertext-Policy Attribute-Based Hierarchical document collection Encryption scheme named CP-ABHE, which performs very well in terms of security, efficiency, and the storage size of the ciphertext.
Journal ArticleDOI
An efficient attribute-based multi-keyword search scheme in encrypted keyword generation
TL;DR: This work considers a secure search service providing fine-grained and search functionality, called attribute-based multiple keyword search (ABMKS), which can be seen as an extension of searchable encryption, and proposes an ABMKS with only multiplication operations in encrypted keyword index generation.
Journal ArticleDOI
Knowledge transfer-based distributed differential evolution for dynamic database fragmentation
TL;DR: A knowledge transfer-based distributed differential evolution algorithm (KT-DDE) is proposed to achieve the optimal communication cost and maintain privacy preservation and experimental results show that the proposed algorithm can outperform the other competitors in terms of solution accuracy, convergence speed, and computation efficiency.
Journal ArticleDOI
MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure
TL;DR: In this article , a CP-ABE-based fine-grained access control scheme is proposed to solve the attribute revocation problem in IoT-based healthcare systems, which includes multiple attribute authorities to reduce the work overhead of having a single authority in the traditional CP•ABE systems.
References
More filters
Journal ArticleDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Proceedings ArticleDOI
Ciphertext-Policy Attribute-Based Encryption
TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI
Attribute-based encryption for fine-grained access control of encrypted data
TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book ChapterDOI
Fuzzy identity-based encryption
Amit Sahai,Brent Waters +1 more
TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content
Fuzzy Identity Based Encryption.
Amit Sahai,Brent Waters +1 more
TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.