An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing

10/25/2018
by   Jing Li, et al.
0

With the increasing number of mobile applications and the popularity of cloud computing, the combination of these two techniques that named mobile cloud computing (MCC) attracts great attention in recent years. A promising public key encryption scheme, Attribute-Based Encryption (ABE), especially the Ciphertext Policy Attribute-Based Encryption (CP-ABE), has been used for realizing fine-grained access control on encrypted data stored in MCC. However, the computational overhead of encryption and decryption grow with the complexity of the access policy. Thus, maintaining data security as well as efficiency of data processing in MCC are important and challenging issues. In this paper, we propose an efficient encryption method based on CP-ABE, which can lower the overhead on data owners. To further reduce the decryption overhead on data receivers, we additionally propose a verifiable outsourced decryption scheme. By security analysis and performance evaluation, the proposed scheme is proved to be secure as well as efficient.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/13/2018

On the security of the hierarchical attribute based encryption scheme proposed by Wang et al

Ciphertext-policy hierarchical attribute-based encryption (CP-HABE) is a...
research
10/25/2018

A Low-latency Secure Data Outsourcing Scheme for Cloud-WSN

With the support of cloud computing, large quantities of data collected ...
research
10/25/2018

Secure Data Access for Wireless Body Sensor Networks

Recently, with the support of mobile cloud computing, a large number of ...
research
03/28/2019

An Approach to Identity Management in Clouds without Trusted Third Parties

The management of sensitive data, including identity management (IDM), i...
research
02/21/2021

Content Confidentiality in Named Data Networking

In this paper we present the design of name based access control scheme ...
research
08/18/2022

A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing

Encrypted data deduplication is an important technique for saving storag...
research
10/25/2018

ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data

Nowadays, a large amount of user privacy-sensitive data is outsourced to...

Please sign up or login with your details

Forgot password? Click here to reset