Advertisement

An Efficient and Revocable Decentralizing Attribute-Based Encryption for Mobile Cloud Computing

  • Lei Sun
  • Yumeng Fu
  • Zuohui Li
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 960)

Abstract

Mobile cloud computing (MCC) is becoming an important way of data sharing. It is of great value for people to store and retrieve personal data at anytime and anywhere. Attribute-based encryption (ABE) can solve the problem of flexible sharing among multiple users in traditional encryption, but it cannot apply to mobile clients directly because of its low efficiency. How to meet the people’s practical application needs and to control and manage the personal data safely and flexibly is a concrete embodiment of the security problem after the cloud computing is mobile. In this paper, an efficient and revocable decentralizing attribute-based encryption scheme for mobile cloud environment is proposed. In the scheme, it does not have the upper limit of the total attribute, and without the central authority (CA), each attribute authority generates private key independently with the users. In addition, the linear secret-sharing scheme (LSSS) is used to construct the access structure with a high flexibility. The method of precomputing and outsourcing can reduce the computation cost of the user side. Besides, the scheme is proved to be static secure and support revocation under the random oracle model. Compared to the existing related schemes, the proposed scheme is more practical and effective in mobile cloud environment.

Keywords

Mobile cloud computing Attribute-based encryption Outsourcing Revocation Decentralizing 

Notes

Acknowledgments

This work was supported by the National Key Research Program of China “Collaborative Precision Positioning Project” (Grant No.2016YFB0501900)

References

  1. 1.
    Wikipedia: The definition of Mobile Cloud Computing. https://en.wikipedia.org/wiki/Mobile_cloud_computing
  2. 2.
    White Paper: Mobile Cloud Computing Solution Brief. Aepona (2010)Google Scholar
  3. 3.
    Cui, Y., Song, J., Miao, C., et al.: Mobile cloud computing research progress and trends. Chin. J. Comput. 40(2), 273–295 (2017)Google Scholar
  4. 4.
  5. 5.
    Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005).  https://doi.org/10.1007/11426639_27CrossRefGoogle Scholar
  6. 6.
    Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 89–98 (2006)Google Scholar
  7. 7.
    Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 456–465. ACM (2007)Google Scholar
  8. 8.
    Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008. LNCS, vol. 5126, pp. 579–591. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-3-540-70583-3_47CrossRefGoogle Scholar
  9. 9.
    Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-19379-8_4CrossRefGoogle Scholar
  10. 10.
    Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Usenix Conference on Security, p. 34. USENIX Association (2011)Google Scholar
  11. 11.
    Hohenberger, S., Waters, B.: Online/offline attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 293–310. Springer, Heidelberg (2014).  https://doi.org/10.1007/978-3-642-54631-0_17CrossRefGoogle Scholar
  12. 12.
    Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-20465-4_31CrossRefGoogle Scholar
  13. 13.
    Vijay, H., Goyal, D., Singla, S.: An efficient and secure solution for attribute revocation problem utilizing CP-ABE scheme in mobile cloud computing. Int. J. Comput. Appl. 129(1), 16–21 (2015)Google Scholar
  14. 14.
    Li, R., Shen, C., He, H., et al.: A lightweight secure data sharing scheme for mobile cloud computing. IEEE Trans. Cloud Comput. 6(2), 344–357 (2017)CrossRefGoogle Scholar
  15. 15.
    Lyu, M., Li, X., Li, H.: Efficient, verifiable and privacy preserving decentralized attribute-based encryption for mobile cloud computing. In: IEEE Second International Conference on Data Science in Cyberspace, pp. 195–204. IEEE Computer Society (2017)Google Scholar
  16. 16.
    Zhao, Z., Wang, J.: Verifiable outsourced ciphertext-policy attribute-based encryption for mobile cloud computing. Ksii Trans. Internet Inf. Syst. 11(6), 3254–3272 (2017)zbMATHGoogle Scholar
  17. 17.
    De, S.J., Ruj, S.: Efficient decentralized attribute based access control for mobile clouds. IEEE Trans. Cloud Comput. (2017)Google Scholar
  18. 18.
    Li, X., Lyu, M.: Multi-authority attribute-based encryption scheme in mobile cloud environment. Appl. Res. Comput. 35(05), 1–9 (2018)Google Scholar
  19. 19.
  20. 20.
    Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010).  https://doi.org/10.1007/978-3-642-13190-5_4CrossRefGoogle Scholar
  21. 21.
    Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 315–332. Springer, Heidelberg (2015).  https://doi.org/10.1007/978-3-662-47854-7_19CrossRefGoogle Scholar
  22. 22.
    Beimel, A.: Secure schemes for secret sharing and key distribution. Int. J. Pure Appl. Math. (1996)Google Scholar
  23. 23.
    Zhang, K., Ma, J., Li, H., et al.: Multi-authority attribute-based encryption with efficient revocation. J. Commun. 38(3), 83–91 (2017)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Zhengzhou Information Science and Technology InstituteZhengzhouChina

Personalised recommendations