Comments on “Attribute-Based Data Sharing Scheme Revisited in Cloud Computing”

2021 ◽  
Vol 16 ◽  
pp. 2579-2580
Author(s):  
Caihui Lan ◽  
Caifen Wang ◽  
Haifeng Li ◽  
Liangliang Liu
2018 ◽  
Vol 8 (12) ◽  
pp. 2519
Author(s):  
Wei Li ◽  
Wei Ni ◽  
Dongxi Liu ◽  
Ren Liu ◽  
Shoushan Luo

With the rapid development of cloud computing, it is playing an increasingly important role in data sharing. Meanwhile, attribute-based encryption (ABE) has been an effective way to share data securely in cloud computing. In real circumstances, there is often a mutual access sub-policy in different providers’ access policies, and the significance of each attribute is usual diverse. In this paper, a secure and efficient data-sharing scheme in cloud computing, which is called unified ciphertext-policy weighted attribute-based encryption (UCP-WABE), is proposed. The weighted attribute authority assigns weights to attributes depending on their importance. The mutual information extractor extracts the mutual access sub-policy and generates the mutual information. Thus, UCP-WABE lowers the total encryption time cost of multiple providers. We prove that UCP-WABE is selectively secure on the basis of the security of ciphertext-policy weighted attribute-based encryption (CP-WABE). Additionally, the results of the implementation shows that UCP-WABE is efficient in terms of time.


2018 ◽  
Vol 6 (2) ◽  
pp. 344-357 ◽  
Author(s):  
Ruixuan Li ◽  
Chenglin Shen ◽  
Heng He ◽  
Xiwu Gu ◽  
Zhiyong Xu ◽  
...  

Author(s):  
Xiuqing Lu ◽  
Zhenkuan Pan ◽  
Hequn Xian

Abstract With the development of big data and cloud computing, more and more enterprises prefer to store their data in cloud and share the data among their authorized employees efficiently and securely. So far, many different data sharing schemes in different fields have been proposed. However, sharing sensitive data in cloud still faces some challenges such as achieving data privacy and lightweight operations at resource constrained mobile terminals. Furthermore, most data sharing schemes have no integrity verification mechanism, which would result in wrong computation results for users. To solve the problems, we propose an efficient and secure data sharing scheme for mobile devices in cloud computing. Firstly, the scheme guarantees security and authorized access of shared sensitive data. Secondly, the scheme realizes efficient integrity verification before users share the data to avoid incorrect computation. Finally, the scheme achieves lightweight operations of mobile terminals on both data owner and data requester sides.


2020 ◽  
Vol E103.D (2) ◽  
pp. 222-229
Author(s):  
Huiyao ZHENG ◽  
Jian SHEN ◽  
Youngju CHO ◽  
Chunhua SU ◽  
Sangman MOH

Sign in / Sign up

Export Citation Format

Share Document