Article
Computer Science, Information Systems
Dilxat Ghopur, Jianfeng Ma, Xindi Ma, Yinbin Miao, Jialu Hao, Tao Jiang
Summary: This study presents a new encryption scheme that combines ciphertext-policy attribute-based encryption with puncturable encryption for efficient and flexible user revocation in cloud data applications. The scheme includes a proxy server to reduce computational overhead and uses digital signatures to ensure operation correctness. Numerical analysis and experimental simulation confirm the suitability of the proposed scheme for user revocation in a cloud environment.
SCIENCE CHINA-INFORMATION SCIENCES
(2023)
Article
Computer Science, Information Systems
Ruyuan Zhang, Jiguo Li, Yang Lu, Jinguang Han, Yichen Zhang
Summary: This article presents a key escrow-free CP-ABE scheme with user revocation, which can withstand collusion attacks between malicious users and revoked users. The scheme utilizes re-encryption technology to prevent revoked users from decrypting ciphertexts.
INFORMATION SCIENCES
(2022)
Article
Computer Science, Hardware & Architecture
Leyou Zhang, Chuchu Zhao, Qing Wu, Yi Mu, Fatemeh Rezaeibagha
Summary: Mobile healthcare is a smart health system that utilizes mobile devices and cloud storage for rapid medical treatment. However, privacy leakage and security challenges are prominent issues in these systems. This article proposes a privacy preserving traceable approach that allows for fine-grained access control and ensures user undeniability.
JOURNAL OF SYSTEMS ARCHITECTURE
(2022)
Article
Computer Science, Hardware & Architecture
Zhishuo Zhang, Wen Huang, Shijie Zhou, Yongjian Liao
Summary: This paper proposes a decentralized ciphertext-policy attribute-based encryption scheme for fine-grained access control in mobile edge computing. The scheme utilizes mutually verifiable outsourced decryption and non-delegated computing mode attribute revocation, providing higher efficiency, stronger security, and simplified network topology.
JOURNAL OF SYSTEMS ARCHITECTURE
(2022)
Article
Computer Science, Information Systems
Yi Wu, Wei Zhang, Hu Xiong, Zhiguang Qin, Kuo-Hui Yeh
Summary: This paper proposes a traceable and revocable ciphertext policy attribute-based encryption scheme with constant-size ciphertext and key to address data privacy protection issues in the Internet of Things (IoT). Compared with existing schemes, our proposed scheme offers advantages such as tracing malicious users, timely revocation of users, improved transmission efficiency, and reduced decryption time.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Review
Computer Science, Information Systems
Alejandro Penuelas-Angulo, Claudia Feregrino-Uribe, Miguel Morales-Sandoval
Summary: This article presents a systematic literature review of attribute-based encryption (ABE) schemes that provide revocation mechanisms in the fog-enabled internet of things (IoT) application domain. The study surveys and discusses existing revocation approaches, explores how the fog is exploited in the reviewed schemes, presents a qualitative comparison, and provides a quantitative comparison of the associated costs. It also discusses opportunities for improving revocable ABE schemes for fog-enabled IoT and the challenges faced by these systems.
INTERNET OF THINGS
(2023)
Article
Computer Science, Information Systems
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Lifei Wei, Kim-Kwang Raymond Choo
Summary: Secure cloud storage is a new cloud service designed to protect the confidentiality of outsourced data and provide flexible data access to cloud users. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is considered a promising technique for securing the service, but it may lead to security breaches due to the misuse of access credentials. This paper investigates cases of access credential misuse and proposes a novel cloud storage system CryptCloud(+) to mitigate such issues. Additionally, security analysis and experiments are presented to demonstrate the system's utility.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2021)
Article
Computer Science, Hardware & Architecture
Shanshan Tu, Muhammad Waqas, Fengming Huang, Ghulam Abbas, Ziaul Haq Abbas
Summary: Fog computing is a revolutionary technology aiming to bridge the gap between cloud data centers and end-users, but its features bring security challenges. The attribute-based encryption technology in traditional cloud computing is not suitable for end users due to restricted computing resources and high end-to-end delay. Therefore, this paper recommends a multi-authority attribute-based encryption (MA-ABE) technique to support revocation and outsourcing attributes to fog computation.
Article
Computer Science, Hardware & Architecture
Ruonan Ma, Leyou Zhang
Summary: The fog computing paradigm extends the facilities of IoT to the edge of the network, providing increased convenience. However, security challenges such as unauthorized access, collusion attacks, cloud attacks, and privacy leaks still exist. Xiong et al. proposed a scheme to address these issues, but it couldn't resist collusion attacks. This study analyzes SEM-ACSIT and proposes a secure and privacy-preserving multi-authority access control scheme named SPMAC, which achieves flexible revocation and resistance against various collusion attacks.
JOURNAL OF SYSTEMS ARCHITECTURE
(2023)
Article
Green & Sustainable Science & Technology
V. Reena Catherine, A. Shajin Nargunam
Summary: Multi Authority Ciphertext-Policy Attribute-Based Encryption (MCP-ABE) is developed for efficient secure operation. The proposed methodology aims to avoid illegal sharing of private keys and provide flexibility in data access and policy changes. It achieves high security with traceable and dynamic policy updating procedure. Performance metrics such as key size, computation time, and functionality are analyzed. Attribute-based encryption offers adaptable and fine-grained control of access, independent of key sharing and management methods.
SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS
(2022)
Article
Computer Science, Information Systems
Jialu Hao, Wenjuan Tang, Cheng Huang, Jian Liu, Huimei Wang, Ming Xian
Summary: This article proposes a secure and fine-grained data sharing scheme with flexible user access privilege update in cloud-assisted IoMT environment. By using proxy re-encryption and key blinding techniques, the cloud server is able to re-encrypt the ciphertext affected by revocation and update keys for unrevoked users. Additionally, by adding attributes for users based on a few key components stored in the cloud, their access rights can be extended without the need for full key re-computation and re-issuance.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Imen Merdassi, Cherif Ghazel, Leila Saidane
Summary: For mobile applications, mobile cloud computing (MCC) is a revolutionary paradigm that allows mobile users to compute and store data on cloud servers. However, it faces challenges in terms of access control, data storage security, and user anonymity. Attribute-based encryption (ABE) provides a fine-grained access control policy for encrypted data in the cloud storage. In this paper, we propose a multi-authority attribute-based access control system that ensures user anonymity, protects user identity, and supports the coexistence of authorities.
JOURNAL OF SUPERCOMPUTING
(2023)
Article
Computer Science, Information Systems
Xin Liu, Hao Wang, Bo Zhang, Bin Zhang
Summary: The proposed ciphertext policy attribute-based encryption method combines with k-times anonymous authentication technology to construct a fine-grained data access control system, ensuring that user computation cost is independent of the size of the access control policy. The system supports user revocation and attribute updates, and is proven to be secure under formal proofs.
INFORMATION SCIENCES
(2022)
Article
Chemistry, Analytical
Ronglei Hu, Ziwei Ma, Li Li, Peiliang Zuo, Xiuying Li, Jiaxin Wei, Sihui Liu
Summary: This paper proposes an access control scheme based on blockchain and CP-ABE, which solves the trust crisis problem in the data-sharing process by utilizing the features of blockchain technology and improves the computational efficiency of the scheme.
Article
Computer Science, Hardware & Architecture
Xinyan Wu, Huanwei Wang, Yangkai Yuan, Fagen Li
Summary: Data deduplication technology is widely used by cloud service providers for managing the growth of data. Efficient encrypted deduplication is necessary to protect data privacy. In this paper, a scheme is proposed that uses a one-way hash chain and XOR operation for encrypted data deduplication and backup.
JOURNAL OF SYSTEMS ARCHITECTURE
(2023)