Article
Computer Science, Theory & Methods
Mande Xie, Yingying Ruan, Haibo Hong, Jun Shao
Summary: With the rapid development of cloud computing, attribute-based encryption (ABE) has attracted widespread attentions due to its unique attribute matching mechanism, while mobile devices have put forward higher requirements for ABE schemes. In this paper, an original hybrid cloud multi-authority ciphertext-policy attribute-based encryption (HCMACP-ABE) scheme is proposed, utilizing the LSSS access structure for secure access control and the private cloud for maintaining user authorization lists and verifying users. The proposal achieves IND-CCA secure and is efficient in a mobile hybrid cloud environment.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2021)
Article
Computer Science, Hardware & Architecture
Richa Sarma, Chandan Kumar, Ferdous Ahmed Barbhuiya
Summary: With the rapid development of IoT, the need for efficient data analysis and processing has led to the development of fog computing. However, data security risks arise due to multiple levels of storage and computation. To address these issues, a multi-authority CP-ABE scheme named MACFI is proposed, which offers efficient ciphertext and secret key size, reduces computation overhead for data users, and is secure and suitable for IoT applications.
JOURNAL OF SYSTEMS ARCHITECTURE
(2022)
Article
Computer Science, Information Systems
Meiyan Xiao, Qiong Huang, Ying Miao, Shunpeng Li, Willy Susilo
Summary: This article proposes a fine-grained access control system based on Key-Policy Attribute-Based Encryption scheme and blockchain to meet the needs of data sharing services, and provides security analysis and system implementation.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Software Engineering
Hadis Hafizpour, Mohammad Ebrahim Shiri, Amir Masoud Rahmani
Summary: This article proposes two new schemes, CP-ABE-AA and KP-ABE-AA, based on attribute-based encryption (ABE), to address security and privacy challenges in fog computing. These schemes provide more secure communications and anonymous recognition, and the simulation results show improvements in key generation, encryption, and decryption times compared to existing schemes.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2023)
Article
Computer Science, Hardware & Architecture
Peng Li, Junzuo Lai, Dehua Zhou, Ye Yang, Wei Wu, Junbin Fang
Summary: Incentive-based applications allow users to receive rewards upon completing tasks, raising concerns about privacy and accountability. Publicly accountable anonymous authentication provides a privacy-preserving way to verify identity while ensuring public accountability. Existing schemes assume a centralized certificate authority, which is not suitable for scenarios involving multiple authorities. To address this, a new primitive called multi-authority linkable and traceable anonymous authentication is proposed, offering privacy protection and public accountability in a multi-authority setting. We provide a security model and a generic construction with a security proof. The proposed scheme is also implemented to demonstrate its efficiency.
Article
Chemistry, Analytical
JoonYoung Lee, MyeongHyun Kim, KiSung Park, SungKee Noh, Abhishek Bisht, Ashok Kumar Das, Youngho Park
Summary: With the increasing adoption of IoT, various IoT environments are being generated, and data access control and privacy protection are essential in these environments. Ciphertext-policy attribute-based encryption (CP-ABE) technology is used to address these requirements, and blockchain is studied to prevent cloud server failures and support data auditing. However, authentication and key agreement are not specified in these systems. Therefore, we propose a data access control and key agreement scheme using CP-ABE in a blockchain-based system, which ensures data security and provides data nonrepudiation, accountability, and verification functions. The proposed protocol is safer and more efficient than other protocols, making it suitable for practical IoT environments.
Article
Multidisciplinary Sciences
Lei Liu, Mingwei Cao, Yeguo Sun
Summary: The paper proposes a fusion data security protection scheme by designing encryption algorithms, deletion algorithms, and storage methods to achieve secure storage of sensitive electronic documents, while using monitoring methods to realize real-time monitoring of user access behavior.
Article
Computer Science, Hardware & Architecture
Xiaohong Zhang, Wenqi Du, Ata Jahangir Moshayedi
Summary: With the rapid development of the mineral industry, the amount of data generated by this industry has increased significantly. To address the challenges of data storage and security, we propose a reliable on-chain and off-chain storage system that combines blockchain technology and Interplanetary file system (IPFS). We also introduce a traceable and revocable multi-authority ciphertext-policy attributed-based encryption (CP-ABE) algorithm to ensure privacy protection and dynamic fine-grained access control. Furthermore, our scheme enables distributed authorization and regulatory capabilities while accurately tracing malicious users and supporting immediate user and attribute revocation.
JOURNAL OF SUPERCOMPUTING
(2023)
Article
Computer Science, Artificial Intelligence
Shixiong Yao, Pujie Jing, Pei Li, Jiageng Chen
Summary: This study proposes a multi-dimension traceable privacy-preserving health code scheme based on blockchain, aiming to prevent tampering of health code information and protect residents' privacy information through techniques such as attribute-based encryption and searchable encryption, and support the traceability of virus transmission chain.
CONNECTION SCIENCE
(2022)
Article
Computer Science, Theory & Methods
Yang Zhao, Yuwei Pang, Xingyu Ke, Bintao Wang, Guobin Zhu, Mingsheng Cao
Summary: Metaverse is an immersive, hyperspace virtual reality space. Due to its characteristics of hyperspace and immersive realism, metaverse has a bright future, but achieving one-to-multiple data sharing is difficult due to ubiquitous user analysis and calculation. Ciphertext-policy attribute-based encryption (CP-ABE) can realize secure file sharing through fine-grained access control, but faces threats such as backdoors and insider attacks. Researchers propose a cryptographic reverse firewall (CRF) to address these attacks, but existing ABE schemes supporting CRF have efficiency and malicious user tracking issues. To improve safety and efficiency, an efficient CP-ABE scheme supporting CRF protection is constructed with functions of outsourcing decryption, offline encryption, and black-box tracking.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2023)
Article
Computer Science, Information Systems
Zaid Abdulsalam Ibrahim, Muhammad Ilyas
Summary: Most research focuses on real-time IoT data and the challenges of storing such massive amounts of data in cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) offers a secure solution for IoT data storage in cloud services. Cloud-assisted IoTs face privacy issues regarding access policies and decryption times. A proposed CP-ABE scheme addresses these issues and provides better storage efficiency, reduced costs, and improved security.
CMC-COMPUTERS MATERIALS & CONTINUA
(2023)
Article
Computer Science, Theory & Methods
Zhishuo Zhang, Wei Zhang, Zhiguang Qin
Summary: The study introduces the PHP-CP-ABE scheme to resist attribute values guessing attacks; by designing an online privacy-protective decryption testing algorithm, it can alleviate the computing burden of the user; the scheme demonstrates indistinguishable security under chosen plaintext attacks and attribute values guessing attacks.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2021)
Article
Computer Science, Hardware & Architecture
K. Sowjanya, Mou Dasgupta, Sangram Ray
Summary: The rapid growth of IoT in healthcare for real-time health monitoring and management of chronic diseases has raised concerns about data security and privacy. A lightweight CP-ABE scheme based on ECC is proposed to enhance data security and reduce decryption overhead in IoT-based healthcare systems.
JOURNAL OF SYSTEMS ARCHITECTURE
(2021)
Article
Mathematics
You Zhao, Ye Fan, Xuefen Bian
Summary: In many universities, students' physical ability data are collected and stored in the cloud using various sensing devices to save computational and storage costs. This paper proposes an online/offline multi-authority key-policy attribute-based encryption scheme for physical ability data. The scheme uses multi-authority to avoid the crisis of a single authority and combines with a cryptographic reverse firewall to resist backdoor attacks.
Article
Multidisciplinary Sciences
Hadjer Goumidi, Saad Harous, Zibouda Aliouat, Abdelhak Mourad Gueroui
Summary: VANET is a fundamental component in intelligent transportation systems, relying on dense exchange of sensed data between vehicles and RSUs, with VCC providing necessary computation and storage capabilities. Security and privacy concerns in VCC include data confidentiality, access control, vehicles' authentication, and conductors' privacy, which need to be addressed.