Autosoft Journal

Online Manuscript Access

Cloud Storage Access Control Scheme of Ciphertext Algorithm Based on Digital Envelope



Ciphertext Policy Attribute-Based Encryption (CP-ABE) has been widely studied in recent years because it is more suitable for access control of shared data under cloud storage environment. In view of problems of flexibility and efficiency of the existing encryption schemes under cloud storage environment, combined with digital envelopes technology, the paper puts forward an optimized scheme based on supporting fine-grained access control. The scheme has the following advantages: Adopting digital envelopes technology, reducing the computational overhead of Data Owner significantly on the basis of the ensuring data confidentiality, using proxy re-encryption technology to realize the support of user and attribute revocation flexibly, furthermore, the backward and forward secrecy also have been ensured. Adopting security protocols to distribute the shared keys between users and cloud storage server, cloud storage server can save the overhead in maintenance of a large user key2019s tree. Security and performance analysis show that Cloud storage access control scheme of ciphertext algorithm based on digital envelope can ensure the confidentiality of data, resist collusion attack with forward and backward security, and also reduce the calculation works of the user owners and accessing users.



Total Pages: 6
Pages: 289-294


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways

Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Volume: 22
Issue: 2
Year: 2015

Cite this document


Bethencourt, John, Amit Sahai, and Brent Waters. "Ciphertext-Policy Attribute-Based Encryption." 2007 IEEE Symposium on Security and Privacy (SP ”07) (2007): n. pag. Crossref. Web.

Boneh, Dan, Craig Gentry, and Brent Waters. "Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys." Lecture Notes in Computer Science (2005): 258-275. Crossref. Web.

Feng, Yansheng, Hua Ma, and Xiaofeng Chen. "Efficient and Verifiable Outsourcing Scheme of Sequence Comparisons." Intelligent Automation & Soft Computing 21.1 (2014): 51-63. Crossref. Web.

Goyal, Vipul et al. "Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data." Proceedings of the 13th ACM conference on Computer and communications security - CCS ”06 (2006): n. pag. Crossref. Web.

Hur, Junbeom, and Dong Kun Noh. "Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems." IEEE Transactions on Parallel and Distributed Systems 22.7 (2011): 1214-1221. Crossref. Web.

Junod, Pascal, and Alexandre Karlov. "An Efficient Public-Key Attribute-Based Broadcast Encryption Scheme Allowing Arbitrary Access Policies." Proceedings of the tenth annual ACM workshop on Digital rights management - DRM ”10 (2010): n. pag. Crossref. Web.

Jahid, Sonia, Prateek Mittal, and Nikita Borisov. "EASiER." Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS ”11 (2011): n. pag. Crossref. Web.

Liang, Xiaohui et al. "Attribute Based Proxy Re-Encryption with Delegating Capabilities." Proceedings of the 4th International Symposium on Information, Computer, and Communications Security - ASIACCS ”09 (2009): n. pag. Crossref. Web.

Li, Ming et al. "Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption." IEEE Transactions on Parallel and Distributed Systems 24.1 (2013): 131-143. Crossref. Web.

Lv Z. Jisuanji Kexue yu Tansuo

Nabeel, Mohamed, Ning Shang, and Elisa Bertino. "Privacy Preserving Policy-Based Content Sharing in Public Clouds." IEEE Transactions on Knowledge and Data Engineering 25.11 (2013): 2602-2614. Crossref. Web.

Ostrovsky, Rafail, Amit Sahai, and Brent Waters. "Attribute-Based Encryption with Non-Monotonic Access Structures." Proceedings of the 14th ACM conference on Computer and communications security - CCS ”07 (2007): n. pag. Crossref. Web.

Ruwei, Huang et al. "Study of Privacy-Preserving Framework for Cloud Storage." Computer Science and Information Systems 8.3 (2011): 801-819. Crossref. Web.

Sahai, Amit, and Brent Waters. "Fuzzy Identity-Based Encryption." Advances in Cryptology - EUROCRYPT 2005 (2005): 457-473. Crossref. Web.

SU, Jin-Shu et al. "Attribute-Based Encryption Schemes." Journal of Software 22.6 (2011): 1299-1315. Crossref. Web.

Wang, Guojun, Qin Liu, and Jie Wu. "Achieving Fine-Grained Access Control for Secure Data Sharing on Cloud Servers." Concurrency and Computation: Practice and Experience 23.12 (2011): 1443-1464. Crossref. Web.

Xiong A. P. Mathematical Problems in Engineering


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048