Efficient and privacy-aware attribute-based data sharing in mobile cloud computing

被引:26
作者
Zhang, Yinghui [1 ,2 ,3 ]
Wu, Axin [1 ,3 ]
Zheng, Dong [1 ,3 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Attribute-based encryption; Privacy; Offline computation; Data sharing; ACCESS-CONTROL; KEY EXPOSURE; ENCRYPTION; SIGNATURES; SECURE;
D O I
10.1007/s12652-017-0509-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the era of cloud computing, it is convenient to share large-scale data among various kinds of users. As a kind of attribute-based encryption, ciphertext-policy attribute-based encryption (CP-ABE) is a potential technique for realizing fine-grained access control on shared data. However, traditional CP-ABE is not suitable for mobile cloud computing, where mobile users are resource-limited and privacy is fragile. In this paper, we propose an efficient and privacy-aware attribute-based data sharing system supporting offline key generation and offline encryption. In the proposed system, sensitive attribute values specified in an access structure are not explicitly sent along with a ciphertext. The online/offline encryption mechanism alleviates the computational burden of mobile users by performing most of encryption tasks without draining the battery. In addition, the online/offline key generation mechanism allows the attribute authority to finish most of operations in the key generation process in advance, which enables efficient mobile user registration. Finally, the proposed system is proven fully secure in the standard model and performance analysis shows its effectiveness in mobile cloud computing.
引用
收藏
页码:1039 / 1048
页数:10
相关论文
共 35 条
  • [1] [Anonymous], 1996, SECURE SCHEMES SECRE
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
  • [4] Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
  • [5] Efficient generic on-line/off-line (threshold) signatures without key exposure
    Chen, Xiaofeng
    Zhang, Fangguo
    Tian, Haibo
    Wei, Baodian
    Susilo, Willy
    Mu, Yi
    Lee, Hyunrok
    Kim, Kwangjo
    [J]. INFORMATION SCIENCES, 2008, 178 (21) : 4192 - 4203
  • [6] Chen XF, 2007, LECT NOTES COMPUT SC, V4521, P18
  • [7] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
  • [8] Fully Secure Online/Offline Predicate and Attribute-Based Encryption
    Datta, Pratish
    Dutta, Ratna
    Mukhopadhyay, Sourav
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 331 - 345
  • [9] Even S, 1996, J CRYPTOL, V9, P35, DOI 10.1007/BF02254791
  • [10] Goyal V., 2006, P 2006 INT C PRIVACY, P1