信息网络安全 ›› 2017, Vol. 17 ›› Issue (6): 6-8.doi: 10.3969/j.issn.1671-1122.2017.06.002

• Contents • Previous Articles     Next Articles

Outsourcing Encryption and Decryption CP-ABE Scheme with Revocation Storage in Cloud Computing

QING Yong1, 2, SUN Wei1, XIONG Hu1, ZHAO Yang1   

  1. 1. School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu Sichuan 610054, China;
    2. Dazhou Vocational and Technical College, Dazhou Sichuan 635001, China
  • Received:2017-04-27 Online:2017-06-20

Abstract: Taking into account the user’s need for data privacy and the untrustworthiness of cloud servers, the use of attribute-based cryptography(ABE) to build cloud-oriented security data sharing program is widely studied. When a user is revoked, the existing standard ABE mechanism can’t ensure that the revoked user can’t continue to access the massive ciphertext data in the cloud server. Aiming at the above problems, this paper proposes a ciphertext strategy attribute encryption scheme(SR-CP-ABE) which can support the reusable storage of encryption and decryption by combining the idea of ciphertext update and key update. The program ensures that the user can’t access the ciphertext by periodically updating the ciphertext stored in the cloud server. At the same time, this program through the combination of the idea of key split, encryption and decryption process in the complex computing outsourcing to the untrusted cloud server to reduce the user’s encryption and decryption calculation. The experimental results show that the proposed scheme is efficient and feasible.

Key words: cloud computing, ciphertext access control, outsourcing encryption and decryption computation, user revocation, key update

CLC Number: