Key Derivation Policy For Data Security and Data Integrity in Cloud Computing
Key Derivation Policy For Data Security and Data Integrity in Cloud Computing
Keywords: Attribute-Based Encryption (ABE), Cloud Computing, Data Integrity, Data Security, Key
Derivation Policy (KDP), Secret Key
DOI: 10.3103/S0146411616030032
1. INTRODUCTION
Recently, cloud computing is a significant technology in the Information Technology (IT) and Edu-
cational sectors. Cloud computing is a parallel and distributed computing and service-oriented architec-
ture based on the virtualization. The significant features of the cloud computing are high operational effi-
ciency, scalability, flexibility and minimum capital cost. Regardless of the great benefits, security, confi-
dentiality, and regularity have become serious problems in the cloud computing application. The most
prominent security concern in the cloud computing is data security and privacy, due to its web-based data
storage and management. Users provide data to the cloud service provider for storage and business oper-
ations. Moreover, the entrepreneurs will face the critical consequences if their confidential data is dis-
closed to their business competitors or the public. Many data security techniques are developed to mitigate
the security issues in the cloud. Current data security approaches focus only on cryptographic approaches
where the solutions are derived by the random key generation processes. But, the prevailing security tech-
nique suffers minimum data integrity. Loss of key in the conventional cryptographic techniques crash the
original data provided by the data owner. Fig.1 shows the system model of the key encryption process.
Key-based encryption techniques protect the data confidentiality and prevent the data from the unau-
thorized access. The utilization of encryption alone not provided the required security due to the various
access control policies defined in research works. The fine-grained access control policies are defined
based on user attributes. Hence, the design of access control policies required the identity attributes of the
user. Hence, the research works are shifted into the Attributes Based Encryption (ABE) schemes. The
1 The article is published in the original.
165
166 SENTHIL KUMARI, NADIRA BANU KAMAL
KU-CSP
Private key
Users PKG
ABE is a public key encryption technique that allows users to encrypt and decrypt messages, based on
their attributes. In the ABE scheme, the cipher texts are not encrypted for a particular user. Rather, both
the cipher texts and decryption keys are associated with a set of attributes or a policy over attributes. The
1 user can decrypt a ciphertext only during the proper matching between the decryption key and the cipher
text. ABE schemes are classified into key policy based ABE (KP-ABE) and cipher text-policy based ABE
(CP-ABE). The KP-ABE scheme is based on the association of the attributes and decryption keys of the
1 user. The CP-ABE scheme is based on the association of ciphertext policy and decryption keys of the user.
In the KP-ABE scheme, a cipher text relates to the set of attributes. The decryption key of the user is asso-
ciated with a monotonic tree access structure. The user can decrypt the cipher text, only when the user
attribute related with the cipher text satisfies the tree access structure. The CP-ABE technique is extended
to Hierarchical Attribute Set Based Encryption (HASBE) in order to design the scalable, flexible, fine-
grained access control. The HASBE operation includes several processes such as system setup, domain
authority grant validation, and file creation. The setup algorithm is used to setup the system public key
parameters and master key parameters. The trusted authority domain verifies the new top-level domain
authority when it requests to join the system. The administrative domain authority verifies the newly
joined domain authority whether it is valid or not. The new encrypted file creation is based on the needs
of the owner. The complexity of the new file creation depends upon the size of the domain authority data
file. The HASBE technique increases the efficiency of user revocation in multiple values assignment envi-
ronments. The key escrow problem induced in HASBE technique is considered by Multi-Authority Attri-
bute-Based Encryption (MA-ABE). The main drawback of the ABE technique is the increase in the com-
putational cost for key generation and encryption, and the user privacy encoded information is not pro-
tected and they have suffered the handling problem of simultaneous multiple users and multiple keys. To
overcome these problems, this paper proposes an efficient Key Derivation Policy (KDP) to ensure data
security and integrity in the cloud services. The proposed technique focuses on a robust secret key gener-
ation process and Message Authentication Code (MAC) verification process. The novel contributions of
proposed efficient key derivation policy are listed as
• The multi-attributes-based secret key generation supports the effective adding and removal of many
users.
• The robust key generation mechanism in the proposed efficient Key Derivation Policy (KDP) and
the MAC verification based on block size have the capability to solve the simultaneous multi-users/keys
handling problem.
• The hash-based mapping and the attributes decomposition-based secret key generation reduces the
time complexities and improves the secure data transfer level.
The rest of the paper is structured as follows: Section 2 includes the existing work related to the con-
ventional encryption techniques for the cloud computing applications. Section 3 describes the detailed
description of the proposed Efficient KDP including a robust secret key generation algorithm. Section 4
illustrates the simulation results of the proposed technique and section 5 presents the conclusion and
future work of this paper.
2. RELATED WORKS
This section describes the conventional encryption techniques for the cloud computing applications.
Wan et al. [1] proposed a Hierarchical Attribute-Set-Based Encryption (HASBE) technique for the scal-
able, flexible and fine-grained access control of the outsourced data in the cloud computing. The pro-
posed scheme achieves the scalability and flexibility due to the hierarchical structure. The proposed
scheme was efficient and flexible in dealing with the access control of the outsourced data in the cloud
computing. Yang and Jia [2] proposed an efficient and privacy-protective auditing protocol for supporting
the data dynamic operations in the cloud storage systems. The proposed protocol supports batch auditing
for the multiple owners and clouds, without requiring any trusted organization. The efficiency and secu-
rity of the proposed auditing protocols were improved while reducing the computation cost of the auditing
process.
Li et al. [3] suggested a set of data access control mechanisms for the Personal Health Record (PHR)
stored in the semi-trusted servers. The PHR file of the patient was encrypted, by using the Attribute-
Based Encryption (ABE) techniques. Each user in the PHR system was divided into multiple security
domains, to reduce the complexity in the key management for the data owners and users. The analytical
and experimental results had shown the efficiency, security, and scalability of the proposed scheme. Wang
et al. [4] proposed a secure cloud storage system for the simultaneous privacy-protective public auditing
of the multiple users. The security and performance analysis had described that the proposed schemes
were secure and highly efficient. Wang et al. [5] suggested a flexible auditing mechanism for the cloud
storage, by using the homomorphic token and distributed erasure-coded data. The proposed mechanism
was resistant against various failure and malicious attacks. Fast data error localization was achieved, with-
out any increase in the communication and computation cost.
Wei et al. [6] proposed a Sec Cloud protocol for associating the secure storage and computation audit-
ing in the cloud, by using the Designated Verifier Signature (DVS), batch verification and probabilistic
sampling techniques. The effectiveness and efficiency of the proposed Sec Cloud were improved.
Rewagad and Pawar [7] suggested the combination of the digital signature and Diffie-Hellman key
exchange with the Advanced Encryption Standard (AES) algorithm to enable the protection of the data
confidentiality in the cloud. The three-way mechanisms of the proposed architecture had made it more
difficult to crash the security system. Sun et al. [9] presented an attribute-based keyword search scheme
for independently encrypting and outsourcing data of the multiple owners to the cloud server. The owner-
enforced access policy on the index of each file had achieved fine-grained search authorization. The pro-
posed scheme was efficient and secure against the keyword attack.
Liu et al. [9] presented a clock-based proxy re-encryption scheme that enables the sharing of a secret
key by the data owner and the cloud. The cloud has automatically performed re-encryption of data based
on the internal clock, without receiving any command from the data owner. The proposed scheme had
achieved scalable user revocation and fine-grained access control in the unreliable clouds. Alshehri et al.
1 [10] suggested the utilization of the ciphertext policy based ABE technique to encrypt and decrypt the
Electronic Health Record (EHR). The flexibility and scalability of the proposed approach were realized
using the preliminary experimental results. Ruj et al. [11] proposed a distributed access control in the
cloud algorithm to support the user revocation without the need for redistribution of the keys to all the
cloud users. The computation, communication and storage overheads were reduced by the proposed
approach.
Yang et al. [12] designed an access control framework with efficient attribute revocation method to
match with the dynamic change in the access privileges of the users in large-scale systems. The proposed
scheme was efficient and secure in the random oracle model. Wang et al. [13] proposed a hierarchical
1 encryption scheme combining the identity-based encryption and ciphertext policy based encryption sys-
tems, to achieve fine-grained access control. The access rights were efficiently revoked from the users, by
applying proxy and lazy re-encryption techniques to the proposed scheme. Li et al. [14] proposed a revo-
cable Identity-Based Encryption (IBE) scheme for deploying a hybrid private key for each user. The effi-
ciency and security of the proposed scheme were improved while achieving a reduction in the key gener-
ation complexity.
Zheng et al. [15] proposed a novel verifiable attribute-based keyword search scheme for the outsourced
encrypted data. The performance evaluation had depicted that the proposed scheme was practical and
1 deployable. Liu et al. [16] proposed a proxy re-encryption technique based on attribute and ciphertext
policy, constructed in the composite order bilinear group. The proposed technique integrated the dual
system encryption technology with a selective proof technique. Wu et al. [17] presented a Multi-message
1 Ciphertext-Policy ABE technique, for sharing scalable media based on the attributes of the data users. The
scheme was efficient and flexible while achieving a reduction in the computational complexity of the
cloud servers. Xu et al. [18] proposed a novel attribute-based encryption scheme to generate different class
security keys for the users. The proposed scheme was simple, efficient and secure by using the hierarchical
keys resulting from the one-way function chain. Li et al. [19] proposed Authorized Private Keyword
Search (APKS) solution that enables the delegation and revocation of search capabilities. Efficient multi-
dimensional keyword search was achieved by the proposed solution. Zhu et al. [20] presented an efficient
time-based access control encryption scheme for the cloud services. The effectiveness and security of the
encryption scheme were improved by using the cryptographic integer comparison. The traditional key-
based encryption scheme such as Efficient Privacy-Preserving Demand Response Scheme (EPPDR)
achieves the privacy preservation of demand, adaptive key evolution, and the forward secrecy. The prob-
lem in EPPDR is more computational overhead compared to other encryption methods. The Key Deri-
vation Policies (KDP) required an efficient in the key generation process. The quality enhancement in
outsourced data, a large number of users and the dynamic changed user to set and policies required the
hierarchical process. Chen et al. proposed the new hierarchical key assignment [21] cloud HKA observed
the user revocation issue. The utilization of CloudHKA to encrypt the outsourced data whether it is secure
or not against the honest-but-curious cloud servers. They tested the CloudHKA scheme with the legal
attacks issued by authorized data sources. On the basis of fine-grained access control policies, the selec-
tively sharing of documents is the critical task in the public cloud. Multiple encrypted files on single keys
raised the computational costs. Hence, an alternative technique is required to minimize the computa-
tional overhead in security applications. Nabeel et al. utilized the principle of dynamic sharing of symmet-
ric keys during decryption avoided the public key cryptography. Based on this, they formalized the Broad-
cast Group Key Management (BGKM) [22], which provides the secrets to the users. On the basis of these
secrets, the BGKM allows the derivation of asymmetric keys. Research works addressed the framework
for efficient delivery and resource provisioning was required. Takabi et al. [23] focused the diverse policy
management schemes based on the diverse languages. They introduced the policy management as a ser-
vice designed to provide the unified control point. The overhead and the confidentiality were the import-
ant problems addressed. Nabeel et al. [24] performed coarse grained and fine grained two layer encryp-
tion. Upon two-layer encryption, decomposition of access control policies was the challenging issue. This
problem referred as NP-hard problem. They overcome the problems by using an efficient group key man-
agement. The intensive operations such as data searching, multimedia processing in the mobile cloud pro-
cessing raised the computational burden. Huang et al. [25] presented the new mobile cloud framework
through trust management and private isolation. The chief drawbacks of the existing ABE and KDP
schemes were expensive pairing operations and increase in the complexity and overhead of the admission
policy. The time needed to decipher the cipher text was high, due to the great size of the cipher text.
Hence, in order to overcome these limitations, this paper proposes an efficient KDP for enhanced data
security and integrity in the cloud.
(PSD). The PUD consists of a large number of users and multiple Public Attribute Authorities (PAA).
The mapping of each PUD with the each sector makes the users acquire the credentials of authorities
rather than the interaction with the owner. Initially, users obtain the local keys based on two attributes.
The private keys and secret keys are generated by the logical operations (AND, XOR) performed between
user and data attributes. Then, the owners in cloud upload the ABE encrypted files to the cloud server
associated with the access control policies. Finally, there are two types of user revocation strategies
namely, revocation of the user’s attributes by using an Attributes Authority (AA) and the updating of
access control policies for each document based on information from owner to the server. The two attri-
butes such as data and role attributes are selected for proposed method. The intrinsic properties of data,
referred by data attributes and the roles of entities, defined by role attributes.
The description of variables used in efficient key derivation policies is shown in Table1.
The process of encryption implemented by using the following algorithms:
• Global setup (λ )
• Authority setup (gp)
• Encrypt { M , ( A,) , gp,{Pk }}
• KeyGen (id,G p, i, S k )
• Decrypt {C t , gp, { K i,GID }}
PK OKDP = Y = H ∑v ,{y ,T
k k k ,i }. (3)
k
The global setup defined by the public and personal keys initiate the encryption and decryption process.
2) Authority setup(gp)
The two random exponents are generated for authority that belongs to each attribute i is given by
α i , yi ∈ Z . (4)
The equation (2) is used to generate the following keys: Based on the exponents the master key and the
personal keys are modified in proposed system to assure the efficiency as follows:
{ α
Public key Pk = e ( g1, g 2 ) i , g 2yi for i , } (5)
3) Encrypt
The encryption algorithm uses the message M, n × l matrix A with ρ mapping of row attributes and
global parameters and the public keys. The coefficients for key derivation policy is derived as
C 0 = Me ( g1, g 2 ) ,
s
(7)
λ α ρ ( x )r x
C1, x = e ( g1, g 2 ) x e ( g1, g 2 ) , (8)
C 2, x = g1rx , (9)
y ( x ) rx
C 3, x = g1 ρ g 2ω x . (10)
The coefficients of key derivation policy are used to generate the key to correspond to the identity value
of the message.
4) Keygen
A key defines the unique labels for each attribute in the structure. The depth of the key structure is the
level of recursions in the set. The members at depth 1 are either attribute elements or sets and members at
depth 2 are attribute elements. Let us consider the hash function and the generator and identity. Then, the
private key is generated by using the user and data attributes.
5) Decrypt
The decrypting process computes the coefficients for retrieving the message from encrypted format
with the assumption such that the decryption has secret keys {K ρ( x ),GID } subset of rows Ax of a matrix A as
follows:
e(H (GID), C 2, x )
C1, x = e( g1, g 2 ) λ x e(H (GID), g 2 ) w x . (12)
e(K ρ( x ),GID , C 2, x )
The message computed from the coefficients is described by the following equation:
M = C0/e(g1, g2)S. (13)
The key security for the message transmission computed to ensure the security and integrity. The cloud
repository is formed by the global setup with the security parameter ( λ ) . After initiating the attribute set
and associated keys, randomly taken exponents are used to set up the authority space. The public and
secret keys base on the entropy based mapping function. The data owner raised the request through the
message, which is decomposed into row, and column attributes. The coefficients are encrypted with the
generators preferred. The hash based mapping function and the associated generators are used in key gen-
eration mechanisms. The ABE performed on the selected attributes with the generated keys. The hash
based mapping, secret key generation based on attributes decomposition of message sequence into row
and column format optimized the encryption process, which reduces the time complexities. Fig.2 shows
the flow diagram of the encryption process and MAC verification process.
Data Data
attribute 1 attribute 2
AND operation
User
Local key attribute
XOR operation
Private key
Hashing
operation
Secret key
Lk = a1 ∩ a2. (14)
The private key is generated using the Ex-or operation of the Lk and a3. The secret key KE is generated
by hashing the private key Pk. The cost function is performed using the secret key and the selected file.
Finally, the encryption key is generated. The encryption key can be viewed as the form of equation (15)
KE = H0(H1(F), Pk) ⊕ H2(F). (15)
Here H 0 , H1 and H 2 are all cryptographic hash functions. The file F is encrypted with another key K,
while K will be encrypted with K E . The selected file (F) is encrypted and decrypted with the key generated
(K E ). Finally, the computational cost is calculated for the proposed key generation process. The Boolean
logic and the gates based process in the key generation process includes the attributes in the key generation
process and derives the necessary efficient key derivation policies.
enables high data integrity since it covers all data blocks. The encrypted file is derived from user key is
compared with the file derived from MAC process. If both are equal, then the data are not affected by the
attacks. If it is not equal, then it shows the retrieved data what is corrupted by the unauthorized users.
4. PERFORMANCE ANALYSIS
This section presents the comparative analysis of the performance parameters such as computational
time, computational overhead and average time to derive the keys with the optimization techniques and
average time to generate the keys with optimization on the proposed KDP with the CP-ABE, EPPDR,
and pseudo-random key generation subset cover.
A. Security analysis
This section describes the security analysis of proposed KDP in following cases
• The efficient hash based encryption of data provides the confidentiality to unauthorized users assure
resistance of collision.
• The allocation of specific time period to the user to receive the encryption/decryption key in the
hash property assures the strong data privacy against non-authorized users,
• Secure revocation of user privileges whenever necessary carried out by the hash-based secret key
generation satisfied the assumptions for access control policy formation.
B. Encryption Time
The time required to complete the encryption process is termed as computational time. When the
number of attributes involved in the process increases, it increases the encryption time. The encryption
time computed with ten key attributes is listed in Table 2.
It shows the variations of the encryption time with the number of attributes involved. The time for
encryption increases to the maximum value in the traditional CP-ABE methods. The proposed KDP pro-
vides the minimum time required for the encryption process for a different number of attributes.
Fig. 4 describes the relationship between the computational times with the number of attributes respec-
tively. For the minimum attributes (1), the encryption time of CP-ABE and the KDP are 0.5 and 0.2 secs,
and for maximum attributes (10), they provide 5.5 and 2.9 secs. The proposed KDP algorithm reduces
the encryption time by 60 and 47.27% compared to CP-ABE due to the multi-attributes in single key
generation.
6
CP-ABE KDP
5
Encryption time, s
4
3
2
1
1 2 3 4 5 6 7 8 9 10
No. of attributes involved
100
Computational overhead, ms
KDP EPPDR
80
60
40
20
0
1 2 3 4 5 6 7 8 9 10
No. of evolving session keys
C. Computational Overhead
The measure of the capability of the network to withstand the emulation attackers is called the com-
putational overhead. When the number of attackers increases, the overhead is limited to achieve the
authentication. The computational overhead is mathematically represented as follows:
Table 4. Average Lifetime For Key Derivation Vs. Key Update Interval.
Average Lifetime (ms)
Key Update Interval
Pseudo Random KDP
1 234 200
2 274 208
3 434 256
4 466 341
5 500 490
6 530 504
7 561 541
8 714 547
9 939 638
10 993 684
ten different key update intervals is listed in Table 4. It shows the measures of the average lifetime for key
derivation with the key update interval. The interval for updating process is more than the average lifetime
for the derivation of keys. But, using the proposed KDP algorithm provides the minimum average lifetime
compared to the pseudo-random key generation algorithm.
The interval for the key update is increased in the network that leads to the high network traffic. The
measure of the traffic is expressed as the lifetime of the users. The relationship between the key update
interval and lifetime are depicted in Fig. 6. For the minimum interval (1), the life-time for pseudo-ran-
dom key generation and the multi-attributes key generation are 234 and 200 ms and for maximum intervals
(10) the average lifetime values are 993 and 664 ms. The KDP reduces the average lifetime by 14.23 and
33.13% compared to pseudo-random generator for minimum and maximum update intervals.
1200
KDP Pseudo random key generator
600
KDP Subset cover
500
Average lifetime, ms
400
300
200
100
0
1 2 3 4 5 6 7 8 9 10
Key update interval
for maximum intervals (10) the average lifetime values are 510 and 300 ms. The KDP reduces the average
lifetime by 44 and 41.18% compared to pseudo-random generator for minimum and maximum intervals.
The increase in the generated keys leads to high network traffic. The measure of traffic is expressed as
a lifetime of the users. The relationship between the key update interval and lifetime are depicted in Fig. 7.
The proposed method provides the minimum lifetime compared to the subset cover.
Table 5. Average Lifetime For Key Generation Vs. Key Update Interval.
Average Lifetime (ms)
Key Update Interval
Subset Cover KDP
1 200 112
2 260 217
3 314 290
4 400 315
5 402 390
6 415 398
7 469 397
8 503 302
9 508 380
10 510 300
REFERENCES
1. Z. Wan, J.E. Liu, and R.H. Deng, “HASBE: a hierarchical attribute-based solution for flexible and scalable
access control in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 7, pp. 743–
754, 2012.
2. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,”
IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 1717-1726, 2013.
3. M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud
computing using attribute-based encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 24,
pp. 131–143, 2013.
4. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud stor-
age,” IEEE Transactions on Computers, vol. 62, pp. 362–375, 2013.
5. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud com-
puting,” IEEE Transactions on Services Computing, vol. 5, pp. 220–232, 2012.
6. L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, et al., “Security and privacy for storage and computation in
cloud computing,” Information Sciences, vol. 258, pp. 371–386, 2014.
7. P. Rewagad and Y. Pawar, “Use of Digital Signature with Diffie-Hellman Key Exchange and AES Encryption
Algorithm to Enhance Data Security in Cloud Computing,” in Communication Systems and Network Technolo-
gies (CSNT), 2013 International Conference on, 2013, pp. 437–439.
8. W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, “Protecting your right: Attribute-based keyword search with fine-
grained owner-enforced search authorization in the cloud,” in 2014 Proceedings IEEE INFOCOM, 2014,
pp. 226–234.
9. Q. Liu, G. Wang, and J. Wu, “Clock-based proxy re-encryption scheme in unreliable clouds,” in 41st Interna-
tional Conference on Parallel Processing Workshops (ICPPW), 2012, pp. 304-305.
1 10. S. Alshehri, S.P. Radziszowski, and R.K. Raj, “Secure access for healthcare data in the cloud using ciphertext-
policy attribute-based encryption,” in IEEE 28th International Conference on Data Engineering Workshops
(ICDEW), 2012, 2012, pp. 143–146.
11. S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed access control in clouds,” in IEEE 10th Interna-
tional Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2011, 2011,
pp. 91–98.
12. K. Yang, X. Jia, and K. Ren, “Attribute-based fine-grained access control with efficient revocation in cloud stor-
age systems,” in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communi-
cations security, 2013, pp. 523–528.
13. G. Wang, Q. Liu, J. Wu, and M. Guo, “Hierarchical attribute-based encryption and scalable user revocation for
sharing data in cloud servers,” computers & security, vol. 30, pp. 320–331, 2011.
14. J. Li, X. Chen, C. Jia, and W. Lou, “Identity-based encryption with outsourced revocation in cloud computing,”
2013.
15. Q. Zheng, S. Xu, and G. Ateniese, “Vabks: Verifiable attribute-based keyword search over outsourced encrypted
data,” in 2014 Proceedings IEEE INFOCOM, 2014, pp. 522–530.
16. Q. Liu, G. Wang, and J. Wu, “Time-based proxy re-encryption scheme for secure data sharing in a cloud envi-
ronment,” Information Sciences, vol. 258, pp. 355–370, 2014.
17. Y. Wu, Z. Wei, and H. DENG, “Attribute-based access to scalable media in cloud-assisted content sharing,”
IEEE transactions on multimedia, vol. 15, pp. 778–788, 2013.
18. D. Xu, F. Luo, L. Gao, and Z. Tang, “Fine-grained document sharing using attribute-based encryption in cloud
servers,” in Third International Conference on Innovative Computing Technology (INTECH), 2013, 2013, pp. 65–70.
19. M. Li, S. Yu, N. Cao, and W. Lou, “Authorized private keyword search over encrypted data in cloud comput-
ing,” in 31st International Conference on Distributed Computing Systems (ICDCS), 2011, 2011, pp. 383–392.
20. Y. Zhu, H. Hu, G.-J. Ahn, D. Huang, and S. Wang, “Towards temporal access control in cloud computing,” in
2012 Proceedings IEEE INFOCOM, 2012, pp. 2576–2580.
21. Y.-R. Chen, C.-K. Chu, W.-G. Tzeng, and J. Zhou, “CloudHKA: A Cryptographic Approach for Hierarchical
Access Control in Cloud Computing,” in Applied Cryptography and Network Security. vol. 7954, M. Jacobson,
M. Locasto, P. Mohassel, and R. Safavi-Naini, Eds., ed: Springer Berlin Heidelberg, 2013, pp. 37–52.
22. M. Nabeel, S. Ning, and E. Bertino, “Privacy Preserving Policy-Based Content Sharing in Public Clouds,”
IEEE Transactions on Knowledge and Data Engineering, vol. 25, pp. 2602–2614, 2013.
23. H. Takabi and J. B. D. Joshi, “Policy Management as a Service: An Approach to Manage Policy Heterogeneity
in Cloud Computing Environment,” in 45th Hawaii International Conference on System Science (HICSS), 2012
2012, pp. 5500–5508.
24. M. Nabeel and E. Bertino, “Privacy Preserving Delegated Access Control in Public Clouds,” IEEE Transactions
on Knowledge and Data Engineering, vol. 26, pp. 2268–2280, 2014.
25. H. Dijiang, Z. Zhibin, X. Le, X. Tianyi, and Z. Yunji, “Secure data processing framework for mobile cloud com-
puting,” in IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2011, pp. 614–
618.
SPELL: 1. ciphertext