Journal on Communications ›› 2018, Vol. 39 ›› Issue (7): 39-49.doi: 10.11959/j.issn.1000-436x.2018112

• Papers • Previous Articles     Next Articles

Optimization method for attribute-based cryptographic access control in mobile cloud computing

Jian LIU(),Ming XIAN,Huimei WANG,Hong RONG   

  1. College of Electronic Science,National University of Defense Technology,Changsha 410073,China
  • Revised:2018-04-04 Online:2018-07-01 Published:2018-08-08

Abstract:

For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.

Key words: mobile cloud, access control, two-layer encryption, attribute-based encryption, optimization

CLC Number: 

No Suggested Reading articles found!