Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.

08:00 EDT 12th October 2018 | BioPortfolio

Summary of "Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage."

We propose an attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage environment, in which binary attributes and AND-gate access policy are used. Our proposal enjoys several advantages. Firstly, multi-keyword search is available, and only when a data user's attribute set satisfies access policy in keyword index, and keyword token generated by data user matches index successfully, then data user can obtain ciphertext containing keywords. In this way, more accurate keyword search is achievable. Secondly, the search privacy of data user is protected owing to cloud servers cannot obtain any knowledge of keywords which data user is interested in. Meanwhile, the ciphertext is able to be decrypted when data user's attribute set satisfies access policy specified in the ciphertext, which can both improve security of encryption and achieve secure fine-grained access control. Thirdly, the proposed scheme supports attribute revocation, in our scheme when a data user's attribute is revoked, the version number of attribute, non-revoked data users' secret keys and related ciphertexts will be updated, such that data user whose attribute is revoked does not decrypt updated ciphertext anymore. In addition, based on the assumption of decisional linear (DL) and decisional Diffie-Hellman (DDH), our scheme is proved to be secure against selectively chosen-keyword attacks and selectively chosen-plaintext attacks respectively, and it also ensures token privacy security.


Journal Details

This article was published in the following journal.

Name: PloS one
ISSN: 1932-6203
Pages: e0205675


DeepDyve research library

PubMed Articles [18030 Associated PubMed Articles listed on BioPortfolio]

Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.

With the development of outsourcing data services, data security has become an urgent problem that needs to be solved. Attribute-based encryption is a valid solution to data security in cloud storage....

A searchable personal health records framework with fine-grained access control in cloud-fog computing.

Fog computing can extend cloud computing to the edge of the network so as to reduce latency and network congestion. However, existing encryption schemes were rarely used in fog environment, resulting ...

Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.

In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribut...

Correction: Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.

[This corrects the article DOI: 10.1371/journal.pone.0203225.].

BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems.

The sharing of patients' locations is an important part in mobile medical services and modern smart healthcare. Although location sharing based on blockchains has advantages on decentralization and op...

Clinical Trials [5968 Associated Clinical Trials listed on BioPortfolio]

Evaluation of a Physical Activity Referral Scheme

The study will evaluate the effectiveness of a co-developed exercise referral scheme. Participants will be recruited to one of three groups 1. Co-developed exercise referral scheme, 2. Usu...

Improving Communication During a Pandemic Flu Outbreak

During the last pandemic influenza antivirals were prescribed both as prophylaxis and treatment. However, adherence rates were suboptimal. This study assessed the effect of theory-based an...

Measuring and Understanding the Effects of a Performance Based Financing Scheme Applied to Nutrition Services in Burundi

The government of Burundi is implementing a new financing scheme in health centres. The objective is to provide additional financial compensations to health centres on the basis of their p...

Assessment of the HIV CNS Reservoir, Neurological and Neuro-cognitive Effects, and Source of Rebound HIV in CNS

This study aims to describe in depth the CNS, CNS HIV reservoir and CNS viral rebound in consenting SEARCH 019 subjects prior to, during and after the SEARCH 019 study intervention (VHM + ...

Development and Feasibility of an Incentive Scheme to Promote Walking/Cycling to School

The aim of this study is to investigate whether an incentive scheme is a feasible approach to increase walking/cycling to school.

Medical and Biotech [MESH] Definitions

The perceived attribute of a sound which corresponds to the physical attribute of intensity.

A scheme which provides reimbursement for the health services rendered, generally by an institution, and which provides added financial rewards if certain conditions are met. Such a scheme is intended to promote and reward increased efficiency and cost containment, with better care, or at least without adverse effect on the quality of the care rendered.

A multi- and interdisciplinary field concerned with improving health and achieving equity in health for all people. It transcends national boundaries, promotes cooperation and collaboration within and beyond health science fields, and combines population-based disease prevention with individually-based patient care.

Studies which start with the identification of persons with a disease of interest and a control (comparison, referent) group without the disease. The relationship of an attribute to the disease is examined by comparing diseased and non-diseased persons with regard to the frequency or levels of the attribute in each group.

Making information permanently non-identifiable that is associated with the identity of specific entities via encryption or other methods.

Quick Search


DeepDyve research library

Searches Linking to this Article