2015
DOI: 10.1002/dac.2942
|View full text |Cite
|
Sign up to set email alerts
|

Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage

Abstract: Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute based encryption scheme with attribute revocation in cloud storage, the keyword search in our scheme is attribute based with access control, wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
55
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 123 publications
(55 citation statements)
references
References 38 publications
0
55
0
Order By: Relevance
“…Several other access control models derivated from the CP-ABE scheme have been proposed in the literature. 34,[62][63][64][65][66][67][68][69][70][71][72][73] To achieve a more fine-grained access control mechanism in the cloud storage services and to protect the privacy and security of the data stored in the cloud, Wang et al 74 proposed to combine the hierarchical identity-based encryption 75 and CP-ABE, the so-called HABE. Wan et al 76 extended the work of Bobba et al 61 and designed the hierarchical attribute-set-based encryption for more flexible and scalable access control in cloud computing.…”
Section: Attribute-based Encryptionmentioning
confidence: 99%
“…Several other access control models derivated from the CP-ABE scheme have been proposed in the literature. 34,[62][63][64][65][66][67][68][69][70][71][72][73] To achieve a more fine-grained access control mechanism in the cloud storage services and to protect the privacy and security of the data stored in the cloud, Wang et al 74 proposed to combine the hierarchical identity-based encryption 75 and CP-ABE, the so-called HABE. Wan et al 76 extended the work of Bobba et al 61 and designed the hierarchical attribute-set-based encryption for more flexible and scalable access control in cloud computing.…”
Section: Attribute-based Encryptionmentioning
confidence: 99%
“…Unlike in asymmetric settings, securely encapsulating a single keyword/index is nearly trivial in symmetric settings. In these schemes and subsequent work [8][9][10][11], researchers focus on how to handle full text indices and try to improve efficiency. Another line of work uses deterministic encryption [8,12].…”
Section: Related Workmentioning
confidence: 99%
“…Starting with the work of Boneh et al [13][14][15], searchable encryption has also been considered in the public key setting [10,[16][17][18][19]. The early works lack function privacy until the first definition was suggested very recently by Boneh et al [20].…”
Section: Related Workmentioning
confidence: 99%
“…The risk of unauthorized access to the cloud data increases dramatically. Another solution called proof of retrievability [12][13][14][15][16] utilized error correcting coding technique to recover the damaged data. Remote data possession auditing is a solution to guarantee the availability and integrity of data outsourced to the cloud.…”
mentioning
confidence: 99%
“…To reduce the computation and communication cost, these schemes utilize the sampling technique combined with homomorphic verification instead of the whole-file retrieval verification. Another solution called proof of retrievability [12][13][14][15][16] utilized error correcting coding technique to recover the damaged data. Most previous schemes only verify the data correctness without error identification, localization, and correction.…”
mentioning
confidence: 99%