6
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage

      research-article
      1 , 1 , * , 2
      PLoS ONE
      Public Library of Science

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          With the development of outsourcing data services, data security has become an urgent problem that needs to be solved. Attribute-based encryption is a valid solution to data security in cloud storage. There is no existing scheme that can guarantee the privacy of access structures and achieve attribute-based encryption with keyword search and attribute revocation. In this article, we propose a new searchable and revocable multi-data owner attribute-based encryption scheme with a hidden policy in cloud storage. In the new scheme, the same access policy is used in both the keyword index and message encryption. The advantage of keyword index with access policy is that as long as a user’s attributes satisfy the access policy, the searched ciphertext can be correctly decrypted. This property improves the accuracy of the search results. The hidden policy is used in both the ciphertext and the keyword index to protect users’ privacy. The new scheme contains attribute revocation, which is suitable for the actual situation that a user’s attributes maybe changed over time. In the general bilinear group model, the security of the scheme is demonstrated, and the efficiency of the scheme is analyzed.

          Related collections

          Most cited references24

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Ciphertext-Policy Attribute-Based Encryption

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Hierarchical Identity Based Encryption with Constant Size Ciphertext

                Bookmark

                Author and article information

                Contributors
                Role: Writing – review & editing
                Role: Writing – original draft
                Role: Software
                Role: Editor
                Journal
                PLoS One
                PLoS ONE
                plos
                plosone
                PLoS ONE
                Public Library of Science (San Francisco, CA USA )
                1932-6203
                1 November 2018
                2018
                : 13
                : 11
                : e0206126
                Affiliations
                [1 ] School of Science, Xi’an University of Technology, Xi’an, Shaanxi, China
                [2 ] School of Computer Science and Engineering, Xi’an University of Technology, Xi’an, Shaanxi, China
                University of Colorado Denver, UNITED STATES
                Author notes

                Competing Interests: The authors have declared that no competing interests exist.

                Author information
                http://orcid.org/0000-0003-2485-9541
                Article
                PONE-D-18-05436
                10.1371/journal.pone.0206126
                6211670
                30383840
                c7b608cb-da48-48da-908a-62205523cd2d
                © 2018 Wang et al

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

                History
                : 14 March 2018
                : 8 October 2018
                Page count
                Figures: 2, Tables: 2, Pages: 19
                Funding
                Funded by: the National Natural Science Foundation of China,http://www.nsfc.gov.cn
                Award ID: 61572019, 61173192
                Award Recipient :
                Funded by: the Key Project of Research Foundation of Natural Science Foundation of Shaanxi Province of China,http://www.sninfo.gov.cn/
                Award ID: No. 2016JZ001
                Award Recipient :
                This research is supported by the National Natural Science Foundation of China (No. 61572019, http://www.nsfc.gov.cn) to SW, the Key Project of Research Foundation of Natural Science Foundation of Shaanxi Province of China (NO. 2016JZ001, http://www.sninfo.gov.cn/) to SW. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
                Categories
                Research Article
                Computer and Information Sciences
                Cryptography
                Physical Sciences
                Mathematics
                Cryptography
                Computer and Information Sciences
                Cryptography
                Encryption
                Physical Sciences
                Mathematics
                Cryptography
                Encryption
                Computer and Information Sciences
                Computing Methods
                Cloud Computing
                Physical Sciences
                Mathematics
                Algebra
                Polynomials
                Physical Sciences
                Mathematics
                Applied Mathematics
                Algorithms
                Research and Analysis Methods
                Simulation and Modeling
                Algorithms
                Engineering and Technology
                Structural Engineering
                Built Structures
                Research and Analysis Methods
                Database and Informatics Methods
                Database Searching
                Engineering and Technology
                Management Engineering
                Outsourcing
                Custom metadata
                All relevant data are within the paper and its Supporting Information files.

                Uncategorized
                Uncategorized

                Comments

                Comment on this article