Security analyses of a data collaboration scheme with hierarchical attribute-based encryption in cloud computing

被引:1
|
作者
Tai, Wei-Liang [1 ]
Chang, Ya-Fen [2 ]
Huang, Wen-Hsin [2 ]
机构
[1] Department of Information Communications, Chinese Culture University, No. 55, Hwa-Kang Road, Taipei, Taiwan
[2] Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, No. 129, Section 3, Sanmin Road, Taichung, Taiwan
来源
关键词
Cloud security - Distributed database systems - Cryptography;
D O I
10.6633/IJNS.20200322(2).04
中图分类号
学科分类号
摘要
With the prevalence of cloud computing, users store and share confidential data in the cloud while this approach makes data security become an important and tough issue. To ensure data security, cloud service providers must provide efficient and feasible mechanisms to provide a reliable encryption method and a suitable access control system. In order to realize this ideal, Huang et al. proposed a data collaboration scheme with hierarchical attributebased encryption. After analyzing Huang et al.'s scheme, we find that one weakness exists in their scheme such that the semi-trusted cloud service provider can decrypt the protected data to obtain the plaintext. Data confidentiality is not ensured as claimed. In this paper, we will explicitly indicate how this weakness damages Huang et al.'s scheme. © 2020, Femto Technique Co., Ltd.
引用
收藏
页码:212 / 217
相关论文
共 50 条
  • [1] Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
    Huang, Qinlong
    Yang, Yixian
    Shen, Mansuo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 239 - 249
  • [2] A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
    Fu, Junsong
    Wang, Na
    [J]. IEEE ACCESS, 2019, 7 : 36218 - 36232
  • [3] An improved attribute-based encryption technique towards the data security in cloud computing
    Namasudra, Suyel
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (03):
  • [4] An efficient attribute-based hierarchical data access control scheme in cloud computing
    He, Heng
    Zheng, Liang-han
    Li, Peng
    Deng, Li
    Huang, Li
    Chen, Xiang
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [5] A Hierarchical Attribute-Based Encryption Scheme
    ZOU Xiubin
    [J]. Wuhan University Journal of Natural Sciences, 2013, 18 (03) : 259 - 264
  • [6] Cryptanalysis of Attribute-Based Data Sharing Scheme for data access security in Cloud Computing
    Hu, Aoting
    Jiang, Rui
    Wu, Songyang
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 307 - 310
  • [7] Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing (vol 72, pg 239, 2017)
    Huang, Qinlong
    Yang, Yixian
    Shen, Mansuo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 1534 - 1534
  • [8] Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption
    Zhu, Shuaishuai
    Han, Yiliang
    Wei, Yuechuan
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 257 - 261
  • [9] Blowfish Hybridized Weighted Attribute-Based Encryption for Secure and Efficient Data Collaboration in Cloud Computing
    Ghosh, Smarajit
    Karar, Vinod
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (07):
  • [10] An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
    Wang, Shulan
    Zhou, Junwei
    Liu, Joseph K.
    Yu, Jianping
    Chen, Jianyong
    Xie, Weixin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1265 - 1277