• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Su Hang, Zhu Zhiqiang, Sun Lei. Attribute-Based Encryption with Keyword Search in Mobile Cloud Storage[J]. Journal of Computer Research and Development, 2017, 54(10): 2369-2377. DOI: 10.7544/issn1000-1239.2017.20170431
Citation: Su Hang, Zhu Zhiqiang, Sun Lei. Attribute-Based Encryption with Keyword Search in Mobile Cloud Storage[J]. Journal of Computer Research and Development, 2017, 54(10): 2369-2377. DOI: 10.7544/issn1000-1239.2017.20170431

Attribute-Based Encryption with Keyword Search in Mobile Cloud Storage

More Information
  • Published Date: September 30, 2017
  • In recent years, with the further improvement of mobile devices’ performance and the rapid development of mobile Internet, more and more mobile terminals participate in cloud data storage and data sharing. In order to support mobile devices with constrained resource effectively in terms of sharing data safely and efficiently in the cloud, a secure and efficient attribute-based encryption scheme with keyword search (ABKS) is proposed in this paper. The proposed scheme is based on the AND gate access structure with wildcards, which is proven to be IND-CKA (indistinguishable against chosen keyword attack) secure and achieves keyword security under the standard model. The scheme adopts the Viète’s formulas to make each attribute only be represented by one element, and the length of index is constant, the length of trapdoor and secret key and the computation complexity of trapdoor algorithm and search algorithm grow linearly with the maximum number of wildcards that can be used in the access structure, in addition, the scheme removes the secure channel, which reduces the communication overhead further during the transmission process of index and trapdoor. Efficiency analysis shows that compared with other schemes, the proposed scheme has less computation overhead and communication overhead, which is more suitable for mobile cloud storage environment.
  • Related Articles

    [1]Zhang Zhenyu, Jiang Yuan. Label Noise Robust Learning Algorithm in Environments Evolving Features[J]. Journal of Computer Research and Development, 2023, 60(8): 1740-1753. DOI: 10.7544/issn1000-1239.202330238
    [2]Liu Biao, Zhang Fangjiao, Wang Wenxin, Xie Kang, Zhang Jianyi. A Byzantine-Robust Federated Learning Algorithm Based on Matrix Mapping[J]. Journal of Computer Research and Development, 2021, 58(11): 2416-2429. DOI: 10.7544/issn1000-1239.2021.20210633
    [3]LiJin, YueKun, ZhangDehai, LiuWeiyi. Robust Influence Blocking Maximization in Social Networks[J]. Journal of Computer Research and Development, 2016, 53(3): 601-610. DOI: 10.7544/issn1000-1239.2016.20148341
    [4]Zhang Jing, Feng Lin. An Algorithm of Robust Online Extreme Learning Machine for Dynamic Imbalanced Datasets[J]. Journal of Computer Research and Development, 2015, 52(7): 1487-1498. DOI: 10.7544/issn1000-1239.2015.20140182
    [5]Qin Chuan, Chang Chin Chen, Guo Cheng. Perceptual Robust Image Hashing Scheme Based on Secret Sharing[J]. Journal of Computer Research and Development, 2012, 49(8): 1690-1698.
    [6]Fan Zhiqiang and Zhao Qinping. A Data-Clustering Based Robust SIFT Feature Matching Method[J]. Journal of Computer Research and Development, 2012, 49(5): 1123-1129.
    [7]Zhao Qiyang and Yin Baolin. On the Luminance Overflow in Spread Spectrum Robust Image Watermarking Schemes[J]. Journal of Computer Research and Development, 2009, 46(10): 1729-1736.
    [8]Wang Xiangyang, Hou Limin, Yang Hongying. A Robust Watermarking Scheme Based on Image Feature and PseudoZernike Moments[J]. Journal of Computer Research and Development, 2008, 45(5): 772-778.
    [9]Hu Yusuo and Chen Zonghai. A Novel Robust Estimation Algorithm Based on Linear EIV Model[J]. Journal of Computer Research and Development, 2006, 43(3): 483-488.
    [10]Liu Yi, Wang Yumin. A Robust Itinerary Protection Based on Mobile Agents[J]. Journal of Computer Research and Development, 2005, 42(12): 2106-2110.

Catalog

    Article views (1252) PDF downloads (659) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return