Literature DB >> 29973569

Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing.

Axin Wu1,2, Dong Zheng3,4, Yinghui Zhang5,6, Menglei Yang7.   

Abstract

Attribute-based encryption can be used to realize fine-grained data sharing in open networks. However, in practical applications, we have to address further challenging issues, such as attribute revocation and data search. How do data users search for the data they need in massive amounts of data? When users leave the system, they lose the right to decrypt the shared data. In this case, how do we ensure that revoked users cannot decrypt shared data? In this paper, we successfully address these issues by proposing a hidden policy attribute-based data sharing scheme with direct revocation and keyword search. In the proposed scheme, the direct revocation of attributes does not need to update the private key of non-revoked users during revocation. In addition, a keyword search is realized in our scheme, and the search time is constant with the increase in attributes. In particular, the policy is hidden in our scheme, and hence, users’ privacy is protected. Our security and performance analyses show that the proposed scheme can tackle the security and efficiency concerns in cloud computing.

Entities:  

Keywords:  attribute-based encryption; cloud computing; direct revocation; hidden policy; keyword search

Year:  2018        PMID: 29973569      PMCID: PMC6069486          DOI: 10.3390/s18072158

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


1. Introduction

With the application of intelligent terminals in our lives, a large amount of data can be generated quickly. These collected data are closely related to our lives. By analyzing personal data, one’s behavior can be predicted, and by analyzing the enterprise data, a lot of business secrets can be obtained which can pose a serious threat to individuals [1] or enterprises [2]. Furthermore, there are many threats to data privacy during the processes of data processing [3,4], data transmission [5], data storage [6,7], data search [8], data confidentiality [9,10] and data access [11,12]. Among these security problems, we focus on security issues in cloud storage and cloud computing. While the rapid development of cloud computing brings convenience to enterprises and individuals because of its storage services, computing services, scalability and so on, data security and user privacy are also a big problem [13,14] owing to data being exposed in open network environments [15]. Encrypting data before uploading data to the cloud server can solve data security and user privacy issues very well [16,17]. However, the encryption of data causes the loss of some characteristics of plaintext, and data sharing among numerous data users becomes another problem. Fortunately, attribute-based encryption (ABE) [18] provides a good solution to the data sharing and access control on cloud storage and cloud computing. After Sahai et al. proposed the notion of ABE, much work was done to improve the function and efficiency of the ABE. For example, Li et al. [19] proposed a multi-authority, fine-grained access control scheme. Zhang et al. [20] proposed an anonymous access control scheme for proxy re-encryption. Shen et al. [21] proposed a data sharing scheme with anonymous tracking. These schemes are extensions of the ABE scheme and can be applied to some specific environments. In the scenario of data sharing, the Ciphertext Policy Attribute-Based Encryption (CP-ABE) [22] is more popular. In the CP-ABE system, the data owner specifies the access control structure related to ciphertexts. Only when the user attributes connected with the user secret key satisfy the access control structure, can the data be decrypted correctly. For example, Cai et al. [23] applied CP-ABE to the medical cloud which can help to improve the quality of medical services. Zhang et al. [24] applied CP-ABE to the mobile cloud computing, which makes it possible for resource-limited users to share data with others. Although CP-ABE can bring a lot of convenience to our lives, there are still many problems to be considered in practical applications. For example, how can we ensure that revoked users cannot decrypt shared data? How do data users search for the data they want among massive amounts of data? In addition, in the CP-ABE system, the access control structure is also uploaded to the cloud server with the ciphertext, which may also leakage some sensitive information. In order to solve the above problems, the typical CP-ABE scheme is no longer suitable for the complex cloud computing environment. Therefore, searchable attribute-based encryption schemes (SABE) [25] and revocable attribute-based encryption schemes (RABE) [26] have been put forward. In SABE [27,28], the data owner will upload the encrypted keyword index together with the ciphertext. When data users want to use data, he will generate a keyword trapdoor with his secret key, then uploads it to the cloud server. The cloud server checks whether the ciphertext containing the keyword index exists on the server without knowing the keyword. If it exists, the ciphertext will be returned to data users. Therefore, data users can retrieve the data they want based the keyword trapdoor. However, the search time in most searchable attribute-based encryption schemes increases with the number of attributes, which increases the burden on the server and reduces the user experience. In addition, when the access control structure is uploaded, it will also leakage some sensitive information. The revocation scheme has practical application in dynamic networks and systems. For example, when a user leaves the system, the user identity is revoked in the system [29] which increases the security of the system. The RABE scheme can be divided into indirectly revocable attribute-based encryption (IRABE) schemes [30,31] and directly revocable attribute-based encryption (DRABE) schemes [32,33,34,35]. In the IRABE schemes, the revocation list is maintained by the authority center. When the user is removed from the system, the authority center updates the secret key of the non-revoked user. In DRABE schemes, the user’s revocation list is held by the user. When a user is revoked, the user’s private key does not need to be updated. Comparing the two schemes, the direct revocation scheme is more suitable for open network environments. In order to prevent the revoked users from decrypting the previous ciphertext, we can use the powerful computing power of cloud computing to update the ciphertext when the user is revoked from the system. In order to make the data sharing scheme of CP-ABE more applicable to practical applications, it is necessary to propose a data sharing scheme with the functions of direct revocation and keyword search.

1.1. Our Contribution

In order to solve the problem described above and make the data sharing scheme of ABE more practical, we propose a hidden policy attribute-based data sharing scheme with direct revocation and keyword search (ABERS). Our scheme has the following advantages: Direct revocation of attributes: We use subset covering theorem to achieve the direct revocation of attributes. After revocation, there is no need to update the private key of the non-revoked user. In order to ensure that the users who have been revoked cannot decrypt the previous ciphertext, the ciphertext is updated. Fast keyword search: We use aggregation technology to achieve the fast search of keywords. Keyword search time is constant and will not increase with the numbers of attributes. Hidden policy: We use the AND gate access control structure to achieve the hidden policy. When the ciphertext is uploaded, the access control structure does not need to be uploaded. Thus, the function of the hidden policy can be realized.

1.2. Related Work

We review the work of the AND-gate attribute based encryption, the revocable attribute based encryption and the authorized keyword search in this section. AND-gate attribute based encryption: Sahai and Waters [18] proposed the ABE scheme to solve data sharing and data access control. After Sahai et al. had proposed the ABE, much work was done to improve the function and efficiency of the ABE. In order to apply the function of the ABE scheme more flexibly, ABE was divided into key-policy ABE (KP-ABE) [36] and ciphertext-policy ABE (CP-ABE) [22,37]. In order to facilitate the application of terminal devices, some work was also done in references [38,39]. An AND-gate access structure ABE was introduced by Cheung and Newprot [40]. Unfortunately, there is no hidden access policy in this scheme. Due to the appearance of inner product encryption schemes, several other schemes [28,41,42] follow this structure, while hiding the access policy. Revocable attribute based encryption: The RABE scheme is divided into IRABE schemes [30,31] and DRABE schemes [32,33,34]. In IRABE schemes, the revocation list is maintained by the authority center. When the user is removed from the system, the authority center updates the secret key of the non-revoked user. In DRABE schemes, the user’s revocation list is held by the user. When a user is revoked, the user’s private key does not need to be updated. In order to prevent revoked users from decrypting ciphertexts that existed before revocation, some work on the re-encryption proxy was done in reference [31] without interacting with data owners and in reference [43] without interacting with non-revoked users. Authorized keyword search: The search encryption scheme can be traced back to Perrig et al. [44]. Unfortunately, the scheme has a high computational cost. To accelerate the search, Lee et al. [45] implemented search encryption through hash tables. To make the application scene more flexible, a keyword search encryption scheme based on a public key was proposed in reference [46,47]. In order to make the search more secure, the authentication search encryption scheme was proposed in reference [48,49]. Further work was done in references [50,51]. In reference [50], the authorized keyword search was implemented through ABE technology with multi-keywords. The scheme presented in reference [51] can be applied to multi-user and multi-owner scenes; however, it is not suitable for dynamic network environments.

2. Preliminary

In this section, we mainly introduce the basic knowledge about attribute revocation and keyword search.

2.1. Access Control Structure

The “AND gate” access structure [52] is described as follows: Let represent an attribute list of a user. Let represent an access policy. The attributes satisfy the access control structure, if and only if . Because the access control structure and attribute set have the same structure, when uploading ciphertext, there is no need to upload the control structure. So, the hidden policy can be achieved.

2.2. Multilinear Maps

The concept of multilinear mapping was first proposed by Boneh and Silverberg, as the following [53]. First, run to get ><>), where is a security parameter. The description of the prime number group, , whose order is and contains the generator, , of , is expressed by . A series of linear maps, , are defined as follows: We simplify the description as .

2.3. Subset Cover

First, we introduce the full binary tree T of depth d, in which two functions and are involved. Both and take node x as the input. The function takes the depth of node x as the output. The function takes the path from the roo,t , to the node, , as the output. The use of subset cover theorem to solve the user revocation was referred to by Naor et al. [54]. Let the leaf node express the user in the system. For a set of revoked users, R, we can get all paths, , of the revocation node . The is the smallest set that can cover the unmarked nodes. For ease of understanding, we give a simple example, shown in Figure 1. Eight leaves are contained in the full binary tree, T. If is a revocation set. The paths of nodes and are and , respectively. The set is . The non-revoked leaf nodes are covered by .
Figure 1

Subset cover.

Assumption 1. n-

3. Definition

In this section, we mainly introduce the deployment of the model, the definition of the scheme and the security model of the scheme.

3.1. Deployment

ABERS can be applied to real environments. The data sharing system is shown in Figure 2. It involves four entities: data owner, data user, attribute authority and cloud server. Now, we will introduce their specific functions and functions.
Figure 2

The data sharing system. CT is the ciphertext, I is the keyword index, R′ is the revocation list, T is the keyword trapdoor and SK is the secret key.

Data owner: The data owner is responsible for encrypting the data and generating the keyword index, I, and then uploading the ciphertext, , and keyword index, I. When the revocation list changes, the revocation list, , is sent to the cloud server by the data owners. Data user: When data users want to download data, they should first use their own private keys to generate a keyword trapdoor, T, and then send T to the cloud server to check it. If the request is legal, then the desired data can be obtained. Attribute authority: The attribute authority is responsible for managing all users in the system, initializing the system, publishing the system’s public parameters, , and generating the secret key, , for the user. Cloud server: The cloud server is responsible for storing the ciphertext of the data owner. When the data user sends the keyword trapdoor to the cloud server, the cloud server searches for it. If the file exists, it is returned to the data user. When the new revocation list is received from the data owner, the cloud server updates the ciphertext with the algorithm.

3.2. Definition of the System Model

Our construction algorithm consists of the following eight algorithms. : The algorithm takes the security parameters, , the depth of the tree, d, the set of the user identity, I, and the collection of attributes, U, as inputs with the common system parameters, , and the main secret key, , as the outputs. : The algorithm uses , , the user attribute, S, and the user identity, , as inputs, with as the output. : This algorithm uses , the message, M, an AND-gate access structure, W, a revocation list, R and the keyword, w, as inputs, with the ciphertext, , and keyword index, , as the outputs. : This algorithm takes the user’s secret key, , and a keyword, w, as inputs with a trapdoor, , as the output. 1: This algorithm takes the keyword index, , and a trapdoor, , as inputs with a Boolean value, , as the output. or ⊥: This algorithm takes and as inputs, with m or ⊥ as the output. : This algorithm takes and as inputs with as the output.

3.3. Definition of System Security

The adversaries against the ABERS scheme include unauthorized data users and revoked data users. For unauthorized users, their attributes do not satisfy the access control structure. For revoked data users, their identities are in the revocation list. Both of them try their best to get the information of the ciphertext. Their behavior also includes a secret key recovery attack. They want to get a private key from a keyword trapdoor. The concrete models are as follows: Indistinguishability against chosen plaintext attack (IND-CPA): This security game is defined as follows: Init: The adversary, A, sends a revocation list, , chosen by A to the challenger, B. Setup: B calls the algorithm , and then sends to A. Phase 1: The adversary, A, is able to ask B about the private key of user . When , the enquiry is aborted. Otherwise, B calls the algorithm and then sends to A. Challenge: A sends two messages , () and a challenge access structure, W, to B. B randomly selects and then calls the algorithm and finally, sends to A. Phase 2: A does the same inquiries as in Phase 1. Guess: A outputs the guess of b as . In this game, the advantage of adversary A is defined as follows: If the advantage, Indistinguishability against chosen keyword attack (IND-CKA): This security game is defined as follows: Setup: B calls the algorithm and then sends to A. Phase 1: The adversary, A, is able to ask B about the private key of user . B calls the algorithm and then sends to A. Challenge: A sends two messages, , (), and a challenge access structure, W, to B. B randomly selects and then calls the algorithm and finally, sends to A. Phase 2: A does the same inquiries as in Phase 1. Guess: A outputs the guess of b as . In this game, the advantage of adversary A is defined as follows: If the advantage, Selective security game on updated ciphertext: This security game is defined as follows: Setup: The adversary, A, sends two revocation lists, R and , and an attribute, , that chosen by A to the challenger, B. B calls the algorithm and then sends to A. Phase 1: The adversary, A, is able to ask B about the private key of user . When , the enquiry is aborted. Otherwise, B calls the algorithm and then sends to A. Challenge: A sends two messages, , (), and a challenge access structure, W, to B. B randomly selects and then calls the algorithm and and finally, sends to A. Phase 2: A does the same inquiries as in Phase 1. Guess: A outputs the guess of b as . In this game, the advantage of adversary A is defined as follows: If the advantage,

4. Data Sharing System

In this section, we mainly introduce the concrete scheme, which contains the following seven algorithms System initialization, User registration, Ciphertext upload, Trapdoor generation, Ciphertext retrieval, Ciphertext decryption and Ciphertext update. The attribute authority executes the System initialization algorithm to generate public parameters and a master key for the system. Next, a secret key is generated by the attribute authority by running the User registration algorithm for each legitimate user based on their attributes. After that, ciphertext generated by the Ciphertext upload algorithm based on the access control structure can be uploaded to the cloud server to share data. If a data user wants to use data that is shared by a data owner, he first generates a keyword trapdoor with the Trapdoor generation algorithm based on his private key and keyword and uploads the keyword trapdoor to the server. After receiving the request, the cloud server checks whether the ciphertext containing the keyword trapdoor exists by calling the Ciphertext retrieval algorithm. If it exists, the ciphertext is returned to the data user. Then, the data user can decrypt the information with the Ciphertext decryption algorithm if his attributes satisfy the access control structure. In addition, when the cloud service receives the new revocation list from the data owner, the server updates the ciphertext with the Ciphertext update algorithm. The concrete implementation is as follows:

4.1. System Initialization

The attribute authority runs the algorithm according to the system model definition. It runs the group generation algorithm to get . Then, it selects a random number, and a hash function, , . Finally, the and are as follows:

4.2. User Registration

At the user registration stage, the interaction between the attribute authority and the system user is as shown Figure 3—when the attribute authority receives the user’s attributes, S, and identity, , the algorithm is called and returns the secret key, , to the system user safely.
Figure 3

User registration.

The concrete algorithms are as follows: Suppose that the path of is , where and . The algorithm sets . Then, it calls the following recursive algorithm: , for . Then, for , it randomly selects . In addition, a random number, , is selected. Finally, it calculates , , , , , . The secret key is .

4.3. Ciphertext Uploading

At the ciphertext uploading phase, the interaction between the cloud server and the data owner is as shown as Figure 4: The data owner calls the algorithm and then uploads the ciphertext, , and keyword index, I, to the cloud server.
Figure 4

Ciphertext uploaded.

The concrete algorithms are as follows: The algorithm randomly selects and then calculates , , , , , . Suppose the path of element is , where represents and . Then, the algorithm sets . Finally, it calls the recursive algorithm for and calculates . The ciphertext and keyword index are as follows:

4.4. Trapdoor Generation

At the trapdoor generation phase, the interaction between the cloud server and the data user is as shown as Figure 5: The data user calls the algorithm , and then uploads the keyword trapdoor, T, to the cloud server.
Figure 5

Trapdoor generation.

The data user generates the keyword trapdoor with the following formula: No information about w can be obtained from .

4.5. Ciphertext Retrieval

The cloud server runs the algorithm according to the definition of the system model. It retrieves the file containing the keyword w with the following formula: When the equation is correct, it returns 1. The file exists on the cloud server. When the equation is wrong, it returns 0. The file does not exist on the cloud server. The correctness of the phase Ciphertext retrieval is verified as follows:

4.6. Ciphertext Decryption

At the ciphertext decryption stage, the interaction between the cloud server and the data user is as shown as Figure 6: The data user calls the algorithm. If the user is legal, the ciphertext will be deciphered.
Figure 6

Ciphertext decryption.

The concrete algorithms are as follows: If , the attribute list S does not satisfy the access control structure. The algorithm returns ⊥. When , The algorithm outputs ⊥. Otherwise, it calculates the following process. If does not belong to R, there will be a node, , where and . At the same time, there is for . The algorithm sets . Then, it calls the recursive algorithm for . The equation can be obtained. Then, it calculates Finally, the following formula is used to get the plaintext: The correctness of the Ciphertext decryption phase is verified as follows:

4.7. Ciphertext Update

When the revocation is changed, the ciphertext stored on the cloud server will be updated. The cloud server runs the algorithm according to the definition of the system model. It inputs a ciphertext, , and a new revocation list, , where outputs the updated ciphertext, . If , for . is set. For , y is a child of x. Let and set . Then, it calls the recursive algorithm for . Finally, it sets , , , , and . The updated ciphertext is . The ABERS scheme is the

5. Security Proof

If the adversary, A, can break through our scheme with an advantage that we cannot ignore, a simulator, B, can call the Adversary, A, to break the - assumption. Simulator B inputs the group parameters, , and instantiates the - instance . The game between the simulator B and the attacker A is as follows: Setup: Adversary A selects a revocation list, , and sends it to B. For each element, , in the revocation list, , the simulator B sets and the hash functions , are simulated as followed: : When is called by the adversary, A (or B), a random number, , is selected (unless it has already been done), and the simulator returns as a response to . : When , is called by the adversary, A (or B), and a random number, , will be selected (if it has already been done, the same result will be returned), and the simulator returns as a response to . When , is called by the adversary, A (or B), a random number, , will be selected (if it has already been done, the same result will be returned), and the simulator returns as a response to . The challenger, B, randomly selects the random number, , and calculates and then returns to A. : The adversary A makes the following enquiries to the challenger. When , the enquiry is aborted. When , if A asks the challenger about the secret key of the user’s identity, , and attributes, , random numbers, and , will be selected. Then, the simulator B calculates , , , and . The path of is represented as and then . After that, B computes by calling multi-linear maps on and . Finally, the secret key, , is returned to A. Challenge: The adversary A sends two messages, , (), and a challenge access structure, W, to B, B randomly selects , and the encryption process is as follows: , , , . In addition, is generated according to the specified algorithm. is set. Finally, is sent to A. Guess: is output by A. When , A plays the security game with B. When Z is a random number in a group, , the information that contains is lost. Therefore, the simulator, B, can call the A to break the - assumption. Because the assumption is difficult, our scheme is secure. Suppose q is a bound on the total number of group elements in the Simulator B inputs the group parameters and instantiates the - instance . The game between the simulator B and the attacker A is as follows: Setup: The hash function, , is simulated as follows: : When is called by the adversary, A (or B), a random number, , will be selected (unless it has already been done), and the simulator returns as a response to . The challenger, B, randomly selects the random number, , and calculates and then returns to A. : The adversary, A, makes the following enquiries to the challenger. The adversary A asks for the keyword, w, connected with and the user’s identity, , for B. The random numbers and will be selected. Then, the simulator, B, calculates , , , and . Finally, the simulator B produces trapdoor as . After that, the trapdoor is sent to A. Challenge: The adversary, A, sends two keywords, , () to B. At the same time, the challenge access control structure, W, will also be sent. B randomly selects and , and the encryption process is as follows: , , . The challenge index, , is sent to A. Phase 2: This stage is the same as Phase 1, but there is the restriction that the trapdoors of generated attributes that satisfy the access control policy have not been queried before. Guess: is output by A. The Schwartz–Zipple lemma [56] points out that the probability of an “unexpected collision” occurring is, at most, . The ABERS scheme achieves selective security on updated ciphertext under the We can see that any polynomial time adversary can not learn any information from the original ciphertext under Theorem 1. The key to proving Theorem 3 is determining whether the original ciphertext is distinguishable from the updated ciphertext. Now let us take a look at whether the original ciphertext and the updated ciphertext generated by the same message, the attribute set, S, and the revocation list, , are uniformly distributed. The original ciphertext generated by calling is where , , , and . The original ciphertext generated by calling is where , , , and . The updated ciphertext generated by calling is where , , , and for , , and , . The original ciphertext and the updated ciphertext have the same terms, and each term is blinded by random numbers. Therefore, the original ciphertext and the updated ciphertext have the same distribution. At this point, similar to the analysis in [43], if the adversary, A, can break through our scheme, the simulator will be able to break the - assumption.

6. Comparison

In this section, we compare our scheme with some related schemes. We have chosen several representative solutions related to the keyword search of ciphertext [42,52,57] and direct revocation [43,57,58]. The results of the comparison are shown in Table 1. Table 1 compares the functional differences between our schemes and related schemes from the perspective of keyword search, fast keyword search, direct revocation, hidden policy, communication overhead and storage overhead. Compared with other schemes, our scheme has better function. It is more accurate than the scheme [52]. The communication cost of the keyword trapdoor is the same, but the functioning of our scheme is greater. Compared with other schemes, the storage cost of our scheme is not very large.
Table 1

Feature comparison of our scheme and other typical schemes .

SchemeKSFKSDRHPCOSO
[58]××× (|L|+|C|+2)|G|
[43]×× (|S|+|C|+2)|G|
[42]×× (2|S|+|Z|+1)|G| (|P|+|P||W|+2)|G|
[52]× |G| (2|S|+5)|G|
[57]× (|N|+3|L|+|I|)|G| (2|S|-2|R|+|W|+|M|+3)|G|
Our scheme |G| (2|S|+|C|+2)|G|

The symbol √ (resp. ×) represents the corresponding feature is (resp. is not) achieved in the scheme. KS means keyword search, FKS means fast keyword search, DR means direct revocation, HP means hidden policy, CO means communication overhead and SO means storage sverhead. |S| means the number of user attributes, |Z| means the bit length of an element of , |G| means the bit length of an element of , |I| means the bit length of user ID, |L| means the number of rows of the access control matrix, |P| means the number of columns of the access control structure, |C| means the cardinality of cover(R), |R| means the cardinality of a revocation list, |M| means the maximum number of revoked users and |N| means the number of keywords.

Next, we compare the efficiency of the keyword search. In order to exclude other sources of interference and to make the result more accurate, we tested the schemes on the same platform, and the test results are shown in Figure 7. Figure 7 compares our scheme’s search efficiency with refs. [42,52,57]. We can see that, compared with schemes [42] and [57], the keyword search efficiency in our scheme is very high. The search time cost does not increase linearly with the number of attributes in ciphertext policies, which is not enabled in [42,57]. This is because our search scheme uses aggregated search key technology without pairing the secret key components with the corresponding ciphertext components. In the process of keyword trapdoor generation, only one linear pair operation is needed. In the process of ciphertext retrieval, by comparing whether the results of two pairs of linear pairs are equal, we can determine whether the required ciphertext exists. Although our scheme has the same efficiency in the search phase as that shown in reference [52], our scheme is more functional. From the point of view of function and efficiency, our scheme is more applicable to the practical environment.
Figure 7

The comparison of keyword search performance.

7. Conclusions and Future Work

In this article, we have put forward a hidden policy attribute-based data sharing scheme with direct revocation and keyword search. The scheme has the following advantages. First, it uses subset covering theorem to achieve the direct revocation of attributes. After revocation, there is no need to update the private key of a non-revoked user. In order to ensure that the users who have been revoked cannot decrypt the previous ciphertext, the ciphertext is updated. In this way, some secret keys do not match some ciphertext, and users who are revoked can not decrypt the previous ciphertext. In addition, when there is a user leaving the system, we just need to send the revocation list to the cloud server and let the cloud server update the ciphertext. Then, the private key of the non-revoked user does not need to be updated. Second, we use aggregation technology to achieve the fast search of keywords. In the process of keyword trapdoor generation, only one linear pair operation is needed. In the process of ciphertext retrieval, by comparing whether the results of two pairs of linear pairs are equal, we can determine whether the required ciphertext exists. So, the keyword search time is constant and does not increase with the number of attributes. Third, the AND gate access control structure is used to achieve the hidden policy. When ciphertext is uploaded, the access control structure does not need to be uploaded. Thus, the function of the hidden policy can be achieved. In brief, when a lot of data is being shared, our solution can provide a good solution. When a user leaves the system, the user needs to interact with the cloud server, and then, the server updates the ciphertext. This not only increases the cost of communication and computing, but the revoked user can decrypt the former ciphertext before the ciphertext is updated which is a threat to the security of the system. If there is no need to update the ciphertext, the revoked user will not be able to decrypt the ciphertext at the moment of revocation. So, in future work, we will solve the problem of how to ensure that the user can not decrypt the previous ciphertext without updating the ciphertext.
  1 in total

1.  Searchable attribute-based encryption scheme with attribute revocation in cloud storage.

Authors:  Shangping Wang; Duqiao Zhao; Yaling Zhang
Journal:  PLoS One       Date:  2017-08-31       Impact factor: 3.240

  1 in total
  1 in total

1.  A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.

Authors:  Binrui Zhu; Willy Susilo; Jing Qin; Fuchun Guo; Zhen Zhao; Jixin Ma
Journal:  Sensors (Basel)       Date:  2019-06-06       Impact factor: 3.576

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.