scispace - formally typeset
Journal ArticleDOI

Revocable Attribute-Based Encryption with Data Integrity in Clouds

TLDR
Li et al. as mentioned in this paper proposed a revocable attribute-based encryption with data integrity protection (RABE-DI) scheme, which can achieve one-to-many encrypted data sharing.
Abstract
Cloud computing enables enterprises and individu-1 als to outsource and share their data. This way, cloud computing 2 eliminates the heavy workload of local information infrastruc-3 ture. Attribute-based encryption has become a promising solution 4 for encrypted data access control in clouds due to the ability 5 to achieve one-to-many encrypted data sharing. Revocation is a 6 critical requirement for encrypted data access control systems. 7 After outsourcing the encrypted attribute-based ciphertext to the 8 cloud, the data owner may want to revoke some recipients that 9 were authorized previously, which means that the outsourced 10 attribute-based ciphertext needs to be updated to a new one 11 that is under the revoked policy. The integrity issue arises when 12 the revocation is executed. When a new ciphertext with the 13 revoked access policy is generated by the cloud server, the data 14 recipient cannot be sure that the newly generated ciphertext 15 guarantees to be decrypted to the same plaintext as the originally 16 encrypted data, since the cloud server is provided by a third 17 party, which is not fully trusted. In this paper, we consider 18 a new security requirement for the revocable attribute-based 19 encryption schemes: integrity. We introduce a formal definition 20 and security model for the revocable attribute-based encryption 21 with data integrity protection (RABE-DI). Then, we propose 22 a concrete RABE-DI scheme and prove its confidentiality and 23 integrity under the defined security model. Finally, we present 24 an implementation result and provide performance evaluation 25 which shows that our scheme is efficient and practical. 26

read more

Citations
More filters
Journal ArticleDOI

Learning-Based Methods for Cyber Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects

TL;DR: Both machine and deep learning methods are presented and analyzed in relation to the detection of cyber attacks in IoT systems and the difficulties faced by the IoT devices or systems after the occurrence of an attack are faced.
Journal ArticleDOI

Toward secure distributed data storage with error locating in blockchain enabled edge computing

TL;DR: A secure distributed data storage scheme is proposed, which can be used in blockchain enabled edge computing and can be executed with low computational cost, which is practical for IOT environment in blockchainenabled edge computing.
Journal ArticleDOI

DOA tracking for seamless connectivity in beamformed IoT-based drones

TL;DR: Simulation results show that the proposed DOA tracking takes lesser time for tracking the current location of the drone target as opposed to conventional DOA estimation methods and it is observed that the tracking process remains unaffected by SNR.
Journal ArticleDOI

BSM-ether: Bribery selfish mining in blockchain-based healthcare systems

TL;DR: Wang et al. as mentioned in this paper proposed a new bribery selfish mining scheme, the BSM-Ether, targeted to Ethereum, which can be easily conducted and has higher rewards than other existing malicious attacks.
Journal ArticleDOI

A new secure arrangement for privacy-preserving data collection

TL;DR: Wang et al. as mentioned in this paper proposed a novel secure arrangement method based on matrix eigenvalue calculation, which is more robust and efficient, which drives the proposed scheme to be more suitable for repeated aggregation.
Related Papers (5)