Secure attribute-based data sharing for resource-limited users in cloud computing

被引:347
|
作者
Li, Jin [1 ]
Zhang, Yinghui [2 ,3 ,4 ]
Chen, Xiaofeng [5 ]
Xiang, Yang [5 ,6 ]
机构
[1] Guangzhou Univ, Sch Comp Sci, Guangzhou, Guangdong, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[4] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
[5] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Shaanxi, Peoples R China
[6] Swinburne Univ Technol, Sch Software & Elect Engn, Hawthorn, Vic, Australia
基金
国家教育部博士点专项基金资助; 中国国家自然科学基金;
关键词
Cloud computing; Access control; Attribute-based encryption; Online/offline encryption; Chosen ciphertext security; ENCRYPTION; EFFICIENT; PROTECTION; REVOCATION;
D O I
10.1016/j.cose.2017.08.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data sharing becomes an exceptionally attractive service supplied by cloud computing platforms because of its convenience and economy. As a potential technique for realizing finegrained data sharing, attribute-based encryption (ABE) has drawn wide attentions. However, most of the existing ABE solutions suffer from the disadvantages of high computation overhead and weak data security, which has severely impeded resource-constrained mobile devices to customize the service. The problem of simultaneously achieving fine-grainedness, high efficiency on the data owner's side, and standard data confidentiality of cloud data sharing actually still remains unresolved. This paper addresses this challenging issue by proposing a new attribute-based data sharing, scheme suitable for resource-limited mobile users in cloud computing. The proposed scheme eliminates a majority of the computation task by adding system public parameters besides moving partial encryption computation offline. In addition, a public ciphertext test phase is performed before the decryption phase, which eliminates most of computation overhead due to illegitimate ciphertexts. For the sake of data security, a Chameleon hash function is used to generate an immediate ciphertext, which will be blinded by the offline ciphertexts to obtain the final online ciphertexts. The proposed scheme is proven secure against adaptively chosen-ciphertext attacks, which is widely recognized as a standard security notion. Extensive performance analysis indicates that the proposed scheme is secure and efficient. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [1] EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing
    Huang Qinlong
    Ma Zhaofeng
    Yang Yixian
    Fu Jingyi
    Niu Xinxin
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (04) : 862 - 868
  • [2] EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing
    HUANG Qinlong
    MA Zhaofeng
    YANG Yixian
    FU Jingyi
    NIU Xinxin
    [J]. Chinese Journal of Electronics, 2015, 24 (04) : 862 - 868
  • [3] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    Fu, Jing-Yi
    Huang, Qin-Long
    Ma, Zhao-Feng
    Yang, Yi-Xian
    [J]. Journal of China Universities of Posts and Telecommunications, 2014, 21 (06): : 45 - 51
  • [4] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    FU Jingyi
    HUANG Qinlong
    MA Zhaofeng
    YANG Yixian
    [J]. TheJournalofChinaUniversitiesofPostsandTelecommunications, 2014, 21 (06) : 45 - 51+77
  • [5] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    FU Jing-yi
    HUANG Qin-long
    MA Zhao-feng
    YANG Yi-xian
    [J]. The Journal of China Universities of Posts and Telecommunications, 2014, (06) : 45 - 51
  • [6] Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
    Wang, Shulan
    Liang, Kaitai
    Liu, Joseph K.
    Chen, Jianyong
    Yu, Jianping
    Xie, Weixin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1661 - 1673
  • [7] Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing
    Li, Xiang
    Tian, Hui
    Ning, Jianting
    [J]. PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 347 - 354
  • [8] Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing
    Zhang, Yinghui
    Chen, Xiaofeng
    Li, Jin
    Li, Hui
    Li, Fenghua
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4028 - 4049
  • [9] Comments on "Attribute-Based Data Sharing Scheme Revisited in Cloud Computing"
    Lan, Caihui
    Wang, Caifen
    Li, Haifeng
    Liu, Liangliang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2579 - 2580
  • [10] Secure Sharing of IOT Data in Cloud Environment Using Attribute-Based Encryption
    Kanimozhi, P.
    Victoire, T. Aruldoss Albert
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (06)