• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Guangqiang. Multi-Authority CP-ABE with Policy Update in Cloud Storage[J]. Journal of Computer Research and Development, 2016, 53(10): 2393-2399. DOI: 10.7544/issn1000-1239.2016.20160432
Citation: Wu Guangqiang. Multi-Authority CP-ABE with Policy Update in Cloud Storage[J]. Journal of Computer Research and Development, 2016, 53(10): 2393-2399. DOI: 10.7544/issn1000-1239.2016.20160432

Multi-Authority CP-ABE with Policy Update in Cloud Storage

More Information
  • Published Date: September 30, 2016
  • Cloud storage, as a novel data storage architecture, has been widely used to provide services for data draw to store and share their data in cloud. However, the security concerns of cloud storage also draw much attention of the whole society. Since some cloud service providers are not trustworthy, the data stored in their cloud servers could be stolen or accessed by unauthorized users. Ciphertext-policy attribute based encryption (CP-ABE) can be used to solve such security problems in cloud, which can encrypt data under a specified access policy thus to maintain data confidentiality as well as access control. Unfortunately, traditional CP-ABE schemes suffer from key escrow problems and are lack of policy update. In this paper, we propose a new multi-authority CP-ABE scheme with policy update, which can efficiently cut down the computation cost and communication cost compared with other schemes in literature. We also prove the semantic security for our scheme, and also analyze its efficiency.
  • Related Articles

    [1]Chen Ruoxi, Chen Jinyin, Zheng Haibin, Yang Xueyan, Ji Shouling, Chen Tieming. Security of Deep Neural Network Supply Chains: A Survey[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440327
    [2]Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin. A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290. DOI: 10.7544/issn1000-1239.2021.20200751
    [3]Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin. Security Issues and Privacy Preserving in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085. DOI: 10.7544/issn1000-1239.2020.20200426
    [4]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [5]Lin Hui, Tian Youliang, Xu Li, Hu Jia. A Novel Privacy Aware Secure Routing Protocol for HWMN[J]. Journal of Computer Research and Development, 2015, 52(8): 1883-1892. DOI: 10.7544/issn1000-1239.2015.20140606
    [6]Ma Zhuo, Zhang Junwei, Ma Jianfeng, and Ji Wenjiang. Provably Secure Certificateless Trusted Access Protocol for WLAN Without Pairing[J]. Journal of Computer Research and Development, 2014, 51(2): 325-333.
    [7]Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.
    [8]Wang Shaohui, Liu Sujuan, Chen Danwei. Scalable RFID Mutual Authentication Protocol with Backward Privacy[J]. Journal of Computer Research and Development, 2013, 50(6): 1276-1284.
    [9]Zhang Xiaoliang, Tu Yongce, Ma Hengtai, Yang Zhian, Hu Xiaohui. An End-to-End Authentication Protocol for Satellite Communication Network[J]. Journal of Computer Research and Development, 2013, 50(3): 540-547.
    [10]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.

Catalog

    Article views (1240) PDF downloads (789) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return