Attribute-Based Data Sharing Scheme Revisited in Cloud Computing

被引:116
|
作者
Wang, Shulan [1 ]
Liang, Kaitai [2 ]
Liu, Joseph K. [3 ]
Chen, Jianyong [4 ]
Yu, Jianping [1 ]
Xie, Weixin [1 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, ATR Key Lab Natl Def Technol, Shenzhen 518060, Peoples R China
[2] Aalto Univ, Dept Comp Sci, Espoo 02150, Finland
[3] Monash Univ, Fac Informat Technol, Melbourne, Vic 3800, Australia
[4] Shenzhen Univ, Coll Comp & Software Engn, Shenzhen 518060, Peoples R China
基金
中国国家自然科学基金; 芬兰科学院;
关键词
Secure data sharing; attribute-based encryption; removing escrow; weighted attribute; cloud computing; PROXY RE-ENCRYPTION; SECURE; EFFICIENT; STORAGE; SYSTEM;
D O I
10.1109/TIFS.2016.2549004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising encryption technique for secure data sharing in the context of cloud computing. Data owner is allowed to fully control the access policy associated with his data which to be shared. However, CP-ABE is limited to a potential security risk that is known as key escrow problem, whereby the secret keys of users have to be issued by a trusted key authority. Besides, most of the existing CP-ABE schemes cannot support attribute with arbitrary state. In this paper, we revisit attribute-based data sharing scheme in order to solve the key escrow issue but also improve the expressiveness of attribute, so that the resulting scheme is more friendly to cloud computing applications. We propose an improved two-party key issuing protocol that can guarantee that neither key authority nor cloud service provider can compromise the whole secret key of a user individually. Moreover, we introduce the concept of attribute with weight, being provided to enhance the expression of attribute, which can not only extend the expression from binary to arbitrary state, but also lighten the complexity of access policy. Therefore, both storage cost and encryption complexity for a ciphertext are relieved. The performance analysis and the security proof show that the proposed scheme is able to achieve efficient and secure data sharing in cloud computing.
引用
收藏
页码:1661 / 1673
页数:13
相关论文
共 50 条
  • [1] Comments on "Attribute-Based Data Sharing Scheme Revisited in Cloud Computing"
    Lan, Caihui
    Wang, Caifen
    Li, Haifeng
    Liu, Liangliang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2579 - 2580
  • [2] Cryptanalysis of Attribute-Based Data Sharing Scheme for data access security in Cloud Computing
    Hu, Aoting
    Jiang, Rui
    Wu, Songyang
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 307 - 310
  • [3] Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    [J]. COMPUTER JOURNAL, 2014, 57 (04): : 579 - 591
  • [4] Attribute-based data transfer with filtering scheme in cloud computing
    [J]. Han, J. (jh843@uowmail.edu.au), 1600, Oxford University Press (57):
  • [5] Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing
    Zhang, Yinghui
    Chen, Xiaofeng
    Li, Jin
    Li, Hui
    Li, Fenghua
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4028 - 4049
  • [6] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Xiehua Li
    Yanlong Wang
    Ming Xu
    Yaping Cui
    [J]. China Communications, 2018, 15 (02) : 138 - 152
  • [7] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Li, Xiehua
    Wang, Yanlong
    Xu, Ming
    Cui, Yaping
    [J]. CHINA COMMUNICATIONS, 2018, 15 (02) : 138 - 152
  • [8] An Attribute-Based Distributed Data Sharing Scheme
    Zaghloul, Ehab
    Li, Tongtong
    Ren, Jian
    [J]. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [9] EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing
    Huang Qinlong
    Ma Zhaofeng
    Yang Yixian
    Fu Jingyi
    Niu Xinxin
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (04) : 862 - 868
  • [10] An Attribute-Based Assured Deletion Scheme in Cloud Computing
    Shan, Fangfang
    Li, Hui
    Li, Fenghua
    Guo, Yunchuan
    Xiong, Jinbo
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2019, 14 (02) : 74 - 91