Skip to main content

An Efficient and Revocable Decentralizing Attribute-Based Encryption for Mobile Cloud Computing

  • Conference paper
  • First Online:
Book cover Trusted Computing and Information Security (CTCIS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 960))

Included in the following conference series:

  • 580 Accesses

Abstract

Mobile cloud computing (MCC) is becoming an important way of data sharing. It is of great value for people to store and retrieve personal data at anytime and anywhere. Attribute-based encryption (ABE) can solve the problem of flexible sharing among multiple users in traditional encryption, but it cannot apply to mobile clients directly because of its low efficiency. How to meet the people’s practical application needs and to control and manage the personal data safely and flexibly is a concrete embodiment of the security problem after the cloud computing is mobile. In this paper, an efficient and revocable decentralizing attribute-based encryption scheme for mobile cloud environment is proposed. In the scheme, it does not have the upper limit of the total attribute, and without the central authority (CA), each attribute authority generates private key independently with the users. In addition, the linear secret-sharing scheme (LSSS) is used to construct the access structure with a high flexibility. The method of precomputing and outsourcing can reduce the computation cost of the user side. Besides, the scheme is proved to be static secure and support revocation under the random oracle model. Compared to the existing related schemes, the proposed scheme is more practical and effective in mobile cloud environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wikipedia: The definition of Mobile Cloud Computing. https://en.wikipedia.org/wiki/Mobile_cloud_computing

  2. White Paper: Mobile Cloud Computing Solution Brief. Aepona (2010)

    Google Scholar 

  3. Cui, Y., Song, J., Miao, C., et al.: Mobile cloud computing research progress and trends. Chin. J. Comput. 40(2), 273–295 (2017)

    Google Scholar 

  4. Gartner: Five trends in cybersecurity for 2017 and 2018. https://www.gartner.com/smarterwithgartner/5-trends-in-cybersecurity-for-2017-and-2018/

  5. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  6. Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 89–98 (2006)

    Google Scholar 

  7. Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 456–465. ACM (2007)

    Google Scholar 

  8. Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008. LNCS, vol. 5126, pp. 579–591. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70583-3_47

    Chapter  Google Scholar 

  9. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_4

    Chapter  Google Scholar 

  10. Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Usenix Conference on Security, p. 34. USENIX Association (2011)

    Google Scholar 

  11. Hohenberger, S., Waters, B.: Online/offline attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 293–310. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54631-0_17

    Chapter  Google Scholar 

  12. Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20465-4_31

    Chapter  Google Scholar 

  13. Vijay, H., Goyal, D., Singla, S.: An efficient and secure solution for attribute revocation problem utilizing CP-ABE scheme in mobile cloud computing. Int. J. Comput. Appl. 129(1), 16–21 (2015)

    Google Scholar 

  14. Li, R., Shen, C., He, H., et al.: A lightweight secure data sharing scheme for mobile cloud computing. IEEE Trans. Cloud Comput. 6(2), 344–357 (2017)

    Article  Google Scholar 

  15. Lyu, M., Li, X., Li, H.: Efficient, verifiable and privacy preserving decentralized attribute-based encryption for mobile cloud computing. In: IEEE Second International Conference on Data Science in Cyberspace, pp. 195–204. IEEE Computer Society (2017)

    Google Scholar 

  16. Zhao, Z., Wang, J.: Verifiable outsourced ciphertext-policy attribute-based encryption for mobile cloud computing. Ksii Trans. Internet Inf. Syst. 11(6), 3254–3272 (2017)

    MATH  Google Scholar 

  17. De, S.J., Ruj, S.: Efficient decentralized attribute based access control for mobile clouds. IEEE Trans. Cloud Comput. (2017)

    Google Scholar 

  18. Li, X., Lyu, M.: Multi-authority attribute-based encryption scheme in mobile cloud environment. Appl. Res. Comput. 35(05), 1–9 (2018)

    Google Scholar 

  19. http://www.arocmag.com/article/02-2018-05-006.html

  20. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_4

    Chapter  Google Scholar 

  21. Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 315–332. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-47854-7_19

    Chapter  Google Scholar 

  22. Beimel, A.: Secure schemes for secret sharing and key distribution. Int. J. Pure Appl. Math. (1996)

    Google Scholar 

  23. Zhang, K., Ma, J., Li, H., et al.: Multi-authority attribute-based encryption with efficient revocation. J. Commun. 38(3), 83–91 (2017)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Key Research Program of China “Collaborative Precision Positioning Project” (Grant No.2016YFB0501900)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yumeng Fu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sun, L., Fu, Y., Li, Z. (2019). An Efficient and Revocable Decentralizing Attribute-Based Encryption for Mobile Cloud Computing. In: Zhang, H., Zhao, B., Yan, F. (eds) Trusted Computing and Information Security. CTCIS 2018. Communications in Computer and Information Science, vol 960. Springer, Singapore. https://doi.org/10.1007/978-981-13-5913-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5913-2_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5912-5

  • Online ISBN: 978-981-13-5913-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics