期刊论文详细信息
Information
Batch Attribute-Based Encryption for Secure Clouds
Chen Yang2  Yang Sun3  Qianhong Wu3  Qiong Huang1 
[1] China Information Security Research Institute, No. 11 ShangDi Xinxi Road, Beijing 100085, China; E-Mail;China Information Security Research Institute, No. 11 ShangDi Xinxi Road, Beijing 100085, China; E-Mail:;School of Electronics and Information Engineering, Beihang University, XueYuan Road No.37, Haidian District, Beijing 100191, China; E-Mail:
关键词: data privacy;    access control;    cloud storage;    batch attribute-based encryption;   
DOI  :  10.3390/info6040704
来源: mdpi
PDF
【 摘 要 】

Cloud storage is widely used by organizations due to its advantage of allowing universal access with low cost. Attribute-based encryption (ABE) is a kind of public key encryption suitable for cloud storage. The secret key of each user and the ciphertext are associated with an access policy and an attribute set, respectively; in addition to holding a secret key, one can decrypt a ciphertext only if the associated attributes match the predetermined access policy, which allows one to enforce fine-grained access control on outsourced files. One issue in existing ABE schemes is that they are designed for the users of a single organization. When one wants to share the data with the users of different organizations, the owner needs to encrypt the messages to the receivers of one organization and then repeats this process for another organization. This situation is deteriorated with more and more mobile devices using cloud services, as the ABE encryption process is time consuming and may exhaust the power supplies of the mobile devices quickly. In this paper, we propose a batch attribute-based encryption (BABE) approach to address this problem in a provably-secure way. With our approach, the data owner can outsource data in batches to the users of different organizations simultaneously. The data owner is allowed to decide the receiving organizations and the attributes required for decryption. Theoretical and experimental analyses show that our approach is more efficient than traditional encryption implementations in computation and communication.

【 授权许可】

CC BY   
© 2015 by the authors; licensee MDPI, Basel, Switzerland.

【 预 览 】
附件列表
Files Size Format View
RO202003190004079ZK.pdf 331KB PDF download
  文献评价指标  
  下载次数:9次 浏览次数:21次