Advertisement

Topics

Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.

08:00 EDT 1st November 2018 | BioPortfolio

Summary of "Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage."

With the development of outsourcing data services, data security has become an urgent problem that needs to be solved. Attribute-based encryption is a valid solution to data security in cloud storage. There is no existing scheme that can guarantee the privacy of access structures and achieve attribute-based encryption with keyword search and attribute revocation. In this article, we propose a new searchable and revocable multi-data owner attribute-based encryption scheme with a hidden policy in cloud storage. In the new scheme, the same access policy is used in both the keyword index and message encryption. The advantage of keyword index with access policy is that as long as a user's attributes satisfy the access policy, the searched ciphertext can be correctly decrypted. This property improves the accuracy of the search results. The hidden policy is used in both the ciphertext and the keyword index to protect users' privacy. The new scheme contains attribute revocation, which is suitable for the actual situation that a user's attributes maybe changed over time. In the general bilinear group model, the security of the scheme is demonstrated, and the efficiency of the scheme is analyzed.

Affiliation

Journal Details

This article was published in the following journal.

Name: PloS one
ISSN: 1932-6203
Pages: e0206126

Links

DeepDyve research library

PubMed Articles [26494 Associated PubMed Articles listed on BioPortfolio]

Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.

We propose an attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage environment, in which binary attributes and AND-gate access policy are us...

Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.

In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribut...

Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters.

Revocation functionality and hierarchy key delegation are two necessary and crucial requirements to identity-based cryptosystems. Revocable hierarchical identity-based encryption (RHIBE) has attracted...

Correction: Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.

[This corrects the article DOI: 10.1371/journal.pone.0203225.].

Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm.

Security is the most critical issue amid transmission of medical images because it contains sensitive information of patients. Medical image security is an essential method for secure the sensitive da...

Clinical Trials [8556 Associated Clinical Trials listed on BioPortfolio]

Improving Communication During a Pandemic Flu Outbreak

During the last pandemic influenza antivirals were prescribed both as prophylaxis and treatment. However, adherence rates were suboptimal. This study assessed the effect of theory-based an...

Real World Data on Gi(l)Otrif® Dose Adjustment

This is a non-interventional, multi-country, multi-site study based on existing data from medical records of patients treated with Gi(l)otrif® as part of the routine treatment according t...

The Genomic Ascertainment Cohort

Background: Genes tell a person s body how to grow and work. All people have variations in their genes. Some of these cause differences that show up in a person s traits or their health. ...

Reflux Disease Therapy in the Management of Childhood Asthma-data Entry and Analysis Only

There have been a number of studies which attribute causality between reflux disease and asthma. In addition, clinicians typically treat chronic asthmatics with high dose acid suppressing...

Afatinib Osimertinib Sequencing NIS

This is a non-interventional, multi-country, multi-centre cohort study based on existing data from medical records of patients with EGFR mutation-positive advanced NSCLC treated with afati...

Medical and Biotech [MESH] Definitions

Making information permanently non-identifiable that is associated with the identity of specific entities via encryption or other methods.

Information application based on a variety of coding methods to minimize the amount of data to be stored, retrieved, or transmitted. Data compression can be applied to various forms of data, such as images and signals. It is used to reduce costs and increase efficiency in the maintenance of large volumes of data.

The perceived attribute of a sound which corresponds to the physical attribute of intensity.

A multi- and interdisciplinary field concerned with improving health and achieving equity in health for all people. It transcends national boundaries, promotes cooperation and collaboration within and beyond health science fields, and combines population-based disease prevention with individually-based patient care.

Studies which start with the identification of persons with a disease of interest and a control (comparison, referent) group without the disease. The relationship of an attribute to the disease is examined by comparing diseased and non-diseased persons with regard to the frequency or levels of the attribute in each group.

Advertisement
Quick Search
Advertisement
Advertisement

 


DeepDyve research library

Searches Linking to this Article