Advertisement

An Attribute Based Encryption Middleware with Rank Revocation for Mobile Cloud Storage

  • Qinghe Dong
  • Qian HeEmail author
  • Mengfei Cai
  • Peng Liu
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 214)

Abstract

The Attribute Based Encryption (ABE) algorithm can be used to realize fine grained access control for the mobile cloud storage. In ABE, the decryption algorithm has high complexity and the rank revocation is difficult to be implemented. An ABE middleware with rank revocation is given in this paper. The ABE middleware delegate the ABE decryption operation for the resource constrained mobile device. The attribute authority can revoke the user’s rank through this middleware instantly with fine-grained control and the revocation process may not affect any other users. The ABE middleware is implemented and experiment results show that the ABE middleware improves ABE decryption performance about 30 times.

Keywords

Attribute based encryption Mobile cloud storage Middleware Rank revocation 

Notes

Acknowledgment

This work was partly supported by the National Natural Science Foundation of China (61661015), Ministry of Education Key Lab of Cognitive Radio and Information Processing Found (CRKL160101), Guangxi Collaborative Innovation Center of Cloud Computing and Big Data Found (YD16801), Guangxi Scientific and technological plan (1598008-28), High Level of Innovation Team of Colleges and Universities in Guangxi Outstanding Scholars Program Funding, and GUET Cloud Security and Cloud Service Innovation Group Project.

References

  1. 1.
    The 34th accounting reports of the development situation of China Internet. China Internet, vol. 7 (2014) Google Scholar
  2. 2.
    Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRefGoogle Scholar
  3. 3.
    Feng, D.G., Zhang, M., Zhang, Y., Xu, Z.: Study on cloud computing security. J. Softw. 22(1), 71–83 (2011)CrossRefGoogle Scholar
  4. 4.
    Horváth, M.: Attribute-based encryption optimized for cloud computing. In: Italiano, G.F., Margaria-Steffen, T., Pokorný, J., Quisquater, J.-J., Wattenhofer, R. (eds.) SOFSEM 2015. LNCS, vol. 8939, pp. 566–577. Springer, Heidelberg (2015).  https://doi.org/10.1007/978-3-662-46078-8_47 Google Scholar
  5. 5.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption, pp. 321–334 (2007) Google Scholar
  6. 6.
    Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-19379-8_4 CrossRefGoogle Scholar
  7. 7.
    Wang, Y.D., Yang, J.H., Xu, C., Ling, X., Yang, Y.: Survey on access control technologies for cloud computing. Ruan Jian Xue Bao/J. Softw. 26(5), 1129–1150 (2015)MathSciNetGoogle Scholar
  8. 8.
    Su, J.S., Cao, D., Wang, X.F., Sun, Y.P., Hu, Q.L.: Attribute-based encryption schemes. J. Softw. 22(6), 1299–1315 (2011)MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Pirretti, M., Traynor, P., Mcdaniel, P., et al.: Secure attribute-based systems, pp. 99–112 (2006) Google Scholar
  10. 10.
    Asim, M., Ibraimi, L., Petković, M.: Ciphertext-policy attribute-based broadcast encryption scheme. In: De Decker, B., Lapon, J., Naessens, V., Uhl, A. (eds.) CMS 2011. LNCS, vol. 7025, pp. 244–246. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-24712-5_25 CrossRefGoogle Scholar
  11. 11.
    Wang, P.P., Feng, D.G., Zhang, L.W.: CP-ABE scheme supporting fully fine-grained attribute revocation. J. Softw. 23(10), 2805–2816 (2012)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Belqasmi, F., Glitho, R., Fu, C.: RESTful web services for service provisioning in next-generation networks: a survey. IEEE Commun. Mag. 49(12), 66–73 (2011)CrossRefGoogle Scholar
  13. 13.
    Belqasmi, F., Singh, J., Bani Melhem, S.Y., et al.: SOAP-based vs. RESTful web services: a case study for multimedia conferencing. IEEE Int. Comput. 16(4), 54–63 (2012)CrossRefGoogle Scholar
  14. 14.
    Li, Y., Zeng, Z.Y., Zhang, X.F.: Outsourced decryption scheme supporting attribute revocation. J. Tsinghua Univ. (Sci. Technol.) 12, 1664–1669 (2013)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  1. 1.Key Laboratory of Cognitive Radio and Information Processing, Ministry of EducationGuilin University of Electronic TechnologyGuilinChina
  2. 2.Key Lab of Cloud Computing and Complex SystemGuilin University of Electronic TechnologyGuilinChina
  3. 3.Guangxi Key Lab of Cryptography and Information SecurityGuilin University of Electronic TechnologyGuilinChina

Personalised recommendations