Optimization method for attribute-based cryptographic access control in mobile cloud computing

For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access cont...

Full description

Saved in:
Bibliographic Details
Main Authors: Jian LIU, Ming XIAN, Huimei WANG, Hong RONG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-07-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018112/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539407998353408
author Jian LIU
Ming XIAN
Huimei WANG
Hong RONG
author_facet Jian LIU
Ming XIAN
Huimei WANG
Hong RONG
author_sort Jian LIU
collection DOAJ
description For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.
format Article
id doaj-art-1c9680129eac40749d9a95678976e2c9
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-07-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-1c9680129eac40749d9a95678976e2c92025-01-14T07:15:04ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-07-0139394959719194Optimization method for attribute-based cryptographic access control in mobile cloud computingJian LIUMing XIANHuimei WANGHong RONGFor the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018112/mobile cloudaccess controltwo-layer encryptionattribute-based encryptionoptimization
spellingShingle Jian LIU
Ming XIAN
Huimei WANG
Hong RONG
Optimization method for attribute-based cryptographic access control in mobile cloud computing
Tongxin xuebao
mobile cloud
access control
two-layer encryption
attribute-based encryption
optimization
title Optimization method for attribute-based cryptographic access control in mobile cloud computing
title_full Optimization method for attribute-based cryptographic access control in mobile cloud computing
title_fullStr Optimization method for attribute-based cryptographic access control in mobile cloud computing
title_full_unstemmed Optimization method for attribute-based cryptographic access control in mobile cloud computing
title_short Optimization method for attribute-based cryptographic access control in mobile cloud computing
title_sort optimization method for attribute based cryptographic access control in mobile cloud computing
topic mobile cloud
access control
two-layer encryption
attribute-based encryption
optimization
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018112/
work_keys_str_mv AT jianliu optimizationmethodforattributebasedcryptographicaccesscontrolinmobilecloudcomputing
AT mingxian optimizationmethodforattributebasedcryptographicaccesscontrolinmobilecloudcomputing
AT huimeiwang optimizationmethodforattributebasedcryptographicaccesscontrolinmobilecloudcomputing
AT hongrong optimizationmethodforattributebasedcryptographicaccesscontrolinmobilecloudcomputing