Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing

  • Xiang Li
  • Hui TianEmail author
  • Jianting Ning
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11821)


To ensure the security of mass data sharing in the Internet of Things, the cloud computing platform is supposed to provide data-storage services. The ciphertext-policy attribute-based encryption (CP-ABE) schemes has attracted wide-scale attention since users can access the cloud platform in a fine-grained manner. However, there are still some problems in the existing CP-ABE schemes when directly applied in the Internet of Things environment. The problem of simultaneously achieves large computational cost in the encryption and decryption. Moreover, the privacy of access control policy actually still remains unresolved. To fill the gap of the existing schemes, this paper proposes a suitable data sharing scheme for IoT devices which can’t always be online. We use the online/offline CP-ABE technology with privacy, while hiding the access control structure and reducing the computational cost of the devices when they are online. The asymptotic complexity comparison also shows that our scheme achieves high computation efficiency.


Internet of Things Cloud computing Online/offline encryption Privacy protection Hidden access structure 



This research is supported by the National Natural Science Foundation of China under Grant Nos. U1536115 and U1405254, the Natural Science Foundation of Fujian Province of China under Grant No. 2018J01093, and the Subsidized Project for Postgraduates’ Innovative Fund in Scientific Research of Huaqiao University No. 18013083012.


  1. 1.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security - CCS 2006, Alexandria, Virginia, USA, pp. 89–98. ACM Press (2006)Google Scholar
  2. 2.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334 (2007)Google Scholar
  3. 3.
    Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9 (2010)Google Scholar
  4. 4.
    Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22, 1214–1221 (2011)CrossRefGoogle Scholar
  5. 5.
    Tsang, P.P., Chow, S.S.M., Smith, S.W.: Batch pairing delegation. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 74–90. Springer, Heidelberg (2007). Scholar
  6. 6.
    Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts, 16Google Scholar
  7. 7.
    Hohenberger, S., Waters, B.: Online/offline attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 293–310. Springer, Heidelberg (2014). Scholar
  8. 8.
    Datta, P., Dutta, R., Mukhopadhyay, S.: Fully secure online/offline predicate and attribute-based encryption. In: Lopez, J., Wu, Y. (eds.) ISPEC 2015. LNCS, vol. 9065, pp. 331–345. Springer, Cham (2015). Scholar
  9. 9.
    Cui, J., Zhou, H., Xu, Y., Zhong, H.: OOABKS: online/offline attribute-based encryption for keyword search in mobile cloud. Inf. Sci. 489, 63–77 (2019)CrossRefGoogle Scholar
  10. 10.
    Liu, Z., Jiang, Z.L., Wang, X., Huang, X., Yiu, S.M., Sadakane, K.: Offline/online attribute-based encryption with verifiable outsourced decryption. Concurr. Comput. Pract. Exper. 29, e3915 (2017)CrossRefGoogle Scholar
  11. 11.
    Xu, Q., Tan, C., Zhu, W., Xiao, Y., Fan, Z., Cheng, F.: Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing. Future Gener. Comput. Syst. 97, 306–326 (2019)CrossRefGoogle Scholar
  12. 12.
    Li, J., Zhang, Y., Chen, X., Xiang, Y.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1–12 (2018)CrossRefGoogle Scholar
  13. 13.
    Zhang, Y., Li, J., Yan, H.: Constant size ciphertext distributed CP-ABE scheme with privacy protection and fully hiding access structure. IEEE Access 7, 47982–47990 (2019)CrossRefGoogle Scholar
  14. 14.
    Phuong, T.V.X., Yang, G., Susilo, W.: Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans. Inf. Forensics Secur. 11, 35–45 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.College of Computer Science and TechnologyNational Huaqiao UniversityXiamenPeople’s Republic of China
  2. 2.School of ComputingNational University of SingaporeSingaporeSingapore

Personalised recommendations