Time and Attribute Based Dual Access Control and Data Integrity Verifiable Scheme in Cloud Computing Applications

19Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In the era of big data, cloud-based industrial applications can provide available and convenient data access for resource-constrained smart devices. Attribute-based encryption can be used to ensure data security while providing fine-grained data access. However, current attribute-based encryption schemes rarely consider the access control of time, and the integrity verification of data simultaneously. In response to the above two problems, we propose a time and attribute based dual access control and data integrity verifiable scheme in cloud computing applications (DCDV). Firstly, a hierarchical time tree is introduced in the attribute-based encryption technology by using of hierarchical identity-based encryption technology to set an effective access time period and a specified decryptable time period for the user's attributes key and encrypted data separately. The decryption operation can only be performed if the attribute set of user satisfies the data owner's access policy and the effective access time period of the user's attributes key completely covered the decryption time period set by the data owner. In this way, the data is dual controlled with time and attributes to solve the problem of privacy data leakage caused by private key leakage. Secondly, by using of the inverted index and Merkle hash tree, the data verification tree is designed. The data user can verify the integrity of the ciphertext data returned by the cloud server without decryption, which solves the problem that the cloud server may delete or modify the data. Finally, the security proof and efficiency analysis show that our scheme is secure and practical.

References Powered by Scopus

A view of cloud computing

7341Citations
N/AReaders
Get full text

Fog computing and its role in the internet of things

5204Citations
N/AReaders
Get full text

Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility

4651Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Electronic Health Record Sharing Scheme with Searchable Attribute-Based Encryption on Blockchain

85Citations
N/AReaders
Get full text

Efficient time-oriented latency-based secure data encryption for cloud storage

25Citations
N/AReaders
Get full text

Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability

18Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Zhang, Q., Wang, S., Zhang, D., Wang, J., & Zhang, Y. (2019). Time and Attribute Based Dual Access Control and Data Integrity Verifiable Scheme in Cloud Computing Applications. IEEE Access, 7, 137594–137607. https://doi.org/10.1109/ACCESS.2019.2942649

Readers over time

‘19‘20‘21‘22‘23‘2402468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 10

83%

Lecturer / Post doc 1

8%

Researcher 1

8%

Readers' Discipline

Tooltip

Computer Science 9

64%

Engineering 3

21%

Agricultural and Biological Sciences 1

7%

Economics, Econometrics and Finance 1

7%

Save time finding and organizing research with Mendeley

Sign up for free
0