• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Zhao, Mingyang (Zhao, Mingyang.) [1] | Zhang, Chuan (Zhang, Chuan.) [2] | Wu, Tong (Wu, Tong.) [3] | Ni, Jianbing (Ni, Jianbing.) [4] | Liu, Ximeng (Liu, Ximeng.) [5] | Zhu, Liehuang (Zhu, Liehuang.) [6]

Indexed by:

EI

Abstract:

In this paper, we propose a revocable and privacy-preserving bilateral access control scheme (named PriBAC) for general cloud data sharing (i.e., end-cloud-based data sharing). PriBAC ensures that preference matching is successful only when both parties' preferences are satisfied simultaneously. Otherwise, nothing is leaked beyond whether the preference matching occurs. There are three challenges in designing PriBAC. The first challenge is protecting matching information, i.e., concealing two preference matching processes, in a single cloud server. The second challenge is protecting preference content while preventing receivers from receiving much useless information. The third challenge is how to integrate efficient user revocation mechanisms into bilateral access control to handle frequent user revocation cases in practical cloud data sharing applications. To address the above challenges, the punchline in PriBAC is to leverage Newton's interpolation formula-based secret sharing to enrich the matchmaking encryption technique for constructing a privacy-preserving preference matching mechanism. To achieve efficient user revocation, we integrate a unique symbol into each user's keys and efficiently revoke users by invaliding the corresponding keys. Security analysis proves that PriBAC can resist the chosen-ciphertext attack and preserves preference privacy and matching privacy. Experiments show that PriBAC achieves approximately 3times user performance improvement compared with current state-of-the-art related schemes. © 2005-2012 IEEE.

Keyword:

Access control Disease control Privacy-preserving techniques

Community:

  • [ 1 ] [Zhao, Mingyang]Beijing Institute of Technology, School of Cyberspace Science and Technology, Beijing; 100081, China
  • [ 2 ] [Zhang, Chuan]Beijing Institute of Technology, School of Cyberspace Science and Technology, Beijing; 100081, China
  • [ 3 ] [Zhang, Chuan]Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, Guangdong, Shenzhen; 518055, China
  • [ 4 ] [Wu, Tong]University of Science and Technology Beijing, School of Computer and Communication Engineering, Beijing; 100083, China
  • [ 5 ] [Ni, Jianbing]Queen's University, Department of Electrical and Computer Engineering, Kingston; ON; K7L 3N6, Canada
  • [ 6 ] [Liu, Ximeng]Fuzhou University, College of Computer and Data Science, Fuzhou; 350116, China
  • [ 7 ] [Zhu, Liehuang]Beijing Institute of Technology, School of Cyberspace Science and Technology, Beijing; 100081, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Information Forensics and Security

ISSN: 1556-6013

Year: 2024

Volume: 19

Page: 5389-5404

6 . 3 0 0

JCR@2023

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:341/10929277
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1