Format

Send to

Choose Destination
Sensors (Basel). 2018 Jul 4;18(7). pii: E2158. doi: 10.3390/s18072158.

Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing.

Wu A1,2, Zheng D3,4, Zhang Y5,6, Yang M7.

Author information

1
National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications, Xi'an 710121, China. waxinsec@163.com.
2
Westone Cryptologic Research Center, Beijing 100070, China. waxinsec@163.com.
3
National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications, Xi'an 710121, China. zhengdong@xupt.edu.cn.
4
Westone Cryptologic Research Center, Beijing 100070, China. zhengdong@xupt.edu.cn.
5
National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications, Xi'an 710121, China. prrd2007@163.com.
6
Westone Cryptologic Research Center, Beijing 100070, China. prrd2007@163.com.
7
National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications, Xi'an 710121, China. kmelly@163.com.

Abstract

Attribute-based encryption can be used to realize fine-grained data sharing in open networks. However, in practical applications, we have to address further challenging issues, such as attribute revocation and data search. How do data users search for the data they need in massive amounts of data? When users leave the system, they lose the right to decrypt the shared data. In this case, how do we ensure that revoked users cannot decrypt shared data? In this paper, we successfully address these issues by proposing a hidden policy attribute-based data sharing scheme with direct revocation and keyword search. In the proposed scheme, the direct revocation of attributes does not need to update the private key of non-revoked users during revocation. In addition, a keyword search is realized in our scheme, and the search time is constant with the increase in attributes. In particular, the policy is hidden in our scheme, and hence, users’ privacy is protected. Our security and performance analyses show that the proposed scheme can tackle the security and efficiency concerns in cloud computing.

KEYWORDS:

attribute-based encryption; cloud computing; direct revocation; hidden policy; keyword search

Supplemental Content

Full text links

Icon for Multidisciplinary Digital Publishing Institute (MDPI) Icon for PubMed Central
Loading ...
Support Center