Optimization method for attribute-based cryptographic access control in mobile cloud computing
For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access cont...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-07-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018112/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539407998353408 |
---|---|
author | Jian LIU Ming XIAN Huimei WANG Hong RONG |
author_facet | Jian LIU Ming XIAN Huimei WANG Hong RONG |
author_sort | Jian LIU |
collection | DOAJ |
description | For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications. |
format | Article |
id | doaj-art-1c9680129eac40749d9a95678976e2c9 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2018-07-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-1c9680129eac40749d9a95678976e2c92025-01-14T07:15:04ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-07-0139394959719194Optimization method for attribute-based cryptographic access control in mobile cloud computingJian LIUMing XIANHuimei WANGHong RONGFor the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018112/mobile cloudaccess controltwo-layer encryptionattribute-based encryptionoptimization |
spellingShingle | Jian LIU Ming XIAN Huimei WANG Hong RONG Optimization method for attribute-based cryptographic access control in mobile cloud computing Tongxin xuebao mobile cloud access control two-layer encryption attribute-based encryption optimization |
title | Optimization method for attribute-based cryptographic access control in mobile cloud computing |
title_full | Optimization method for attribute-based cryptographic access control in mobile cloud computing |
title_fullStr | Optimization method for attribute-based cryptographic access control in mobile cloud computing |
title_full_unstemmed | Optimization method for attribute-based cryptographic access control in mobile cloud computing |
title_short | Optimization method for attribute-based cryptographic access control in mobile cloud computing |
title_sort | optimization method for attribute based cryptographic access control in mobile cloud computing |
topic | mobile cloud access control two-layer encryption attribute-based encryption optimization |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018112/ |
work_keys_str_mv | AT jianliu optimizationmethodforattributebasedcryptographicaccesscontrolinmobilecloudcomputing AT mingxian optimizationmethodforattributebasedcryptographicaccesscontrolinmobilecloudcomputing AT huimeiwang optimizationmethodforattributebasedcryptographicaccesscontrolinmobilecloudcomputing AT hongrong optimizationmethodforattributebasedcryptographicaccesscontrolinmobilecloudcomputing |