Comment on "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things"

被引:4
|
作者
Tan, Syh-Yuan [1 ]
机构
[1] Multimedia Univ, Fac Informat Sci & Technol, Melaka 75450, Malaysia
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Access control; ciphertex-policy; attribute-based; encryption; cryptanalysis; fog computing;
D O I
10.1109/ACCESS.2018.2827698
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this comment paper, we point out a security flaw in a data access control system which is built on ciphertext-policy attribute-based encryption (CP-ABE) and attribute-based signature schemes. In particular, we show that the underlying CP-ABE is vulnerable to the collusion attack. As a result, malicious users can collaborate to decrypt a ciphertext, which they are not authorized to decrypt.
引用
收藏
页码:22464 / 22465
页数:2
相关论文
共 50 条
  • [1] Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things
    Huang, Qinlong
    Yang, Yixian
    Wang, Licheng
    IEEE ACCESS, 2017, 5 : 12941 - 12950
  • [2] Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things (vol 5, pg 12941, 2017)
    Huang, Qinlong
    Yang, Yixian
    Wang, Licheng
    IEEE ACCESS, 2018, 6 : 17245 - 17245
  • [3] Secure and Verifiable Data Access Control Scheme With Policy Update and Computation Outsourcing for Edge Computing
    Guan, Yue
    Guo, Songtao
    Li, Pan
    Yang, Yuanyuan
    2020 IEEE 26TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2020, : 398 - 405
  • [4] Secure and Differentiated Fog-Assisted Data Access for Internet of Things
    Yu, Ping
    Ni, Wei
    Zhang, Hua
    Ping Liu, Ren
    Wen, Qiaoyan
    Li, Wenmin
    Gao, Fei
    COMPUTER JOURNAL, 2022, 65 (08): : 1948 - 1963
  • [5] An efficient access control scheme with outsourcing capability and attribute update for fog computing
    Zhang, Peng
    Chen, Zehong
    Liu, Joseph K.
    Liang, Kaitai
    Liu, Hongwei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 753 - 762
  • [6] Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    SENSORS, 2018, 18 (05)
  • [7] Fine-grained attribute update and outsourcing computing access control scheme in fog computing
    Du R.
    Yan P.
    Liu Y.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 160 - 170
  • [8] Efficient Ciphertext Retrieval in Internet of Things Based on Fog Consumption Computing System
    Wang, Bo
    Li, Jian
    PROCEEDINGS OF THE WORLD CONFERENCE ON INTELLIGENT AND 3-D TECHNOLOGIES, WCI3DT 2022, 2023, 323 : 169 - 181
  • [9] Secure Lightweight Stream Data Outsourcing for Internet of Things
    Peng, Su
    Zhao, Liang
    Al-Dubai, Ahmed Y.
    Zomaya, Albert Y.
    Hu, Jia
    Min, Geyong
    Wang, Qiang
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10815 - 10829
  • [10] Secure the Internet of Things with Challenge Response Authentication in Fog Computing
    Alharbi, Salem
    Rodriguez, Peter
    Maharaja, Rajaputhri
    Iyer, Prashant
    Subaschandrabose, Nivethitha
    Ye, Zilong
    2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2017,