New directly revocable attribute-based encryption scheme and its application in cloud storage environment

2016 ◽  
Vol 20 (3) ◽  
pp. 2385-2392 ◽  
Author(s):  
Hao Wang ◽  
Zhihua Zheng ◽  
Lei Wu ◽  
Ping Li
2019 ◽  
Vol 16 (3) ◽  
pp. 797-813
Author(s):  
Qiuting Tian ◽  
Dezhi Han ◽  
Yanmei Jiang

With the development of cloud storage technology, data storage security has become increasingly serious. Aiming at the problem that existing attribute-based encryption schemes do not consider hierarchical authorities and the weight of attribute. A hierarchical authority based weighted attribute encryption scheme is proposed. This scheme will introduce hierarchical authorities and the weight of attribute into the encryption scheme, so that the authorities have a hierarchical relationship and different attributes have different importance. At the same time, the introduction of the concept of weight makes this scheme more flexible in the cloud storage environment and enables fine-grained access control. In addition, this scheme implements an online/offline encryption mechanism to improve the security of stored data. Security proof and performance analysis show that the scheme is safe and effective, and it can resist collusion attacks by many malicious users and authorization centers. It is more suitable for cloud storage environments than other schemes.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 30444-30457 ◽  
Author(s):  
Shangping Wang ◽  
Duo Zhang ◽  
Yaling Zhang ◽  
Lihua Liu

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 50136-50147 ◽  
Author(s):  
Shangping Wang ◽  
Shasha Jia ◽  
Yaling Zhang

2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Hongying Zheng ◽  
Jieming Wu ◽  
Bo Wang ◽  
Jianyong Chen

Attribute-based encryption (ABE) is considered a promising technique for cloud storage where multiple accessors may read the same file. For storage system with specific personal health record (PHR), we propose a modified ciphertext-policy attribute-based encryption scheme with expressive and flexible access policy for public domains. Our scheme supports multiauthority scenario, in which the authorities work independently without an authentication center. For attribute revocation, it can generate different update parameters for different accessors to effectively resist both accessor collusion and authority collusion. Moreover, a blacklist mechanism is designed to resist role-based collusion. Simulations show that the proposed scheme can achieve better performance with less storage occupation, computation assumption, and revocation cost compared with other schemes.


Sign in / Sign up

Export Citation Format

Share Document