Redirigiendo al acceso original de articulo en 20 segundos...
Inicio  /  Information  /  Vol: 6 Par: 4 (2015)  /  Artículo
ARTÍCULO
TITULO

Batch Attribute-Based Encryption for Secure Clouds

Chen Yang    
Yang Sun and Qianhong Wu    

Resumen

Cloud storage is widely used by organizations due to its advantage of allowing universal access with low cost. Attribute-based encryption (ABE) is a kind of public key encryption suitable for cloud storage. The secret key of each user and the ciphertext are associated with an access policy and an attribute set, respectively; in addition to holding a secret key, one can decrypt a ciphertext only if the associated attributes match the predetermined access policy, which allows one to enforce fine-grained access control on outsourced files. One issue in existing ABE schemes is that they are designed for the users of a single organization. When one wants to share the data with the users of different organizations, the owner needs to encrypt the messages to the receivers of one organization and then repeats this process for another organization. This situation is deteriorated with more and more mobile devices using cloud services, as the ABE encryption process is time consuming and may exhaust the power supplies of the mobile devices quickly. In this paper, we propose a batch attribute-based encryption (BABE) approach to address this problem in a provably-secure way. With our approach, the data owner can outsource data in batches to the users of different organizations simultaneously. The data owner is allowed to decide the receiving organizations and the attributes required for decryption. Theoretical and experimental analyses show that our approach is more efficient than traditional encryption implementations in computation and communication.

 Artículos similares

       
 
Manal Rajeh AlShalaan and Suliman Mohamed Fati    
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data th... ver más
Revista: Information

 
Vitalii Yesin, Mikolaj Karpinski, Maryna Yesina, Vladyslav Vilihura, Ruslan Kozak and Ruslan Shevchuk    
The growing popularity of data outsourcing to third-party cloud servers has a downside, related to the serious concerns of data owners about their security due to possible leakage. The desire to reduce the risk of loss of data confidentiality has become ... ver más
Revista: Applied Sciences

 
Xiang Chen, Shouzhi Xu, Kai Ma and Peng Chen    
A consortium system can leverage information to improve workflows, accountability, and transparency through setting up a backbone for these cross-company and cross-discipline solutions, which make it become a hot spot of market application. Users of a co... ver más
Revista: Information

 
Emmanuel A. Adeniyi, Peace Busola Falola, Mashael S. Maashi, Mohammed Aljebreen and Salil Bharany    
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users? credentials and sensitive information. Therefore, ... ver más
Revista: Information

 
Mamoona Humayun, Mahmood Niazi, Maram Fahhad Almufareh, N. Z. Jhanjhi, Sajjad Mahmood and Mohammad Alshayeb    
Cloud computing (CC) is the delivery of computing services on demand and is charged using a ?pay per you use? policy. Of the multiple services offered by CC, SaaS is the most popular and widely adapted service platform and is used by billions of organiza... ver más
Revista: Applied Sciences