• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Zhao, M. (Zhao, M..) [1] | Zhang, C. (Zhang, C..) [2] | Wu, T. (Wu, T..) [3] | Ni, J. (Ni, J..) [4] | Liu, X. (Liu, X..) [5] | Zhu, L. (Zhu, L..) [6]

Indexed by:

Scopus

Abstract:

In this paper, we propose a revocable and privacy-preserving bilateral access control scheme (named PriBAC) for general cloud data sharing (i.e., end-cloud-based data sharing). PriBAC ensures that preference matching is successful only when both parties’ preferences are satisfied simultaneously. Otherwise, nothing is leaked beyond whether the preference matching occurs. There are three challenges in designing PriBAC. The first challenge is protecting matching information, i.e., concealing two preference matching processes, in a single cloud server. The second challenge is protecting preference content while preventing receivers from receiving much useless information. The third challenge is how to integrate efficient user revocation mechanisms into bilateral access control to handle frequent user revocation cases in practical cloud data sharing applications. To address the above challenges, the punchline in PriBAC is to leverage Newton’s interpolation formula-based secret sharing to enrich the matchmaking encryption technique for constructing a privacy-preserving preference matching mechanism. To achieve efficient user revocation, we integrate a unique symbol into each user’s keys and efficiently revoke users by invaliding the corresponding keys. Security analysis proves that PriBAC can resist the chosen-ciphertext attack and preserves preference privacy and matching privacy. Experiments show that PriBAC achieves approximately 3× user performance improvement compared with current state-of-the-art related schemes. IEEE

Keyword:

Access control bilateral access control cloud data sharing Diseases Encryption Medical services Privacy privacy preservation Receivers Servers

Community:

  • [ 1 ] [Zhao M.]School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China
  • [ 2 ] [Zhang C.]School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China
  • [ 3 ] [Wu T.]Associated professor with the School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China
  • [ 4 ] [Ni J.]Assistant professor with the Department of Electrical and Computer Engineering, Queen’s University, Kingston, Ontario, Canada
  • [ 5 ] [Liu X.]College of Computer and Data Science, Fuzhou University, Fuzhou, China
  • [ 6 ] [Zhu L.]School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Source :

IEEE Transactions on Information Forensics and Security

ISSN: 1556-6013

Year: 2024

Volume: 19

Page: 1-1

6 . 3 0 0

JCR@2023

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:55/10051266
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1