Skip to main content
placeholder image

Attribute-based data transfer with filtering scheme in cloud computing

Journal Article


Download full-text (Open Access)

Abstract


  • Data transfer is a transmission of data over a point-to-point or point-to-multipoint

    communication channel. To protect the confidentiality of the transferred data,

    public-key cryptography has been introduced in data transfer schemes (DTSs).

    Data transfer is a transmission of data over a point-to-point or point-to-multipoint communication channel. To protect the confidentiality of the transferred data, public-key cryptography has been introduced in data transfer schemes (DTSs). Unfortunately, there exist some drawbacks in the current DTSs. First, the sender must know who the real receivers are. This is undesirable in a system where the number of the users is very large, such as cloud computing. In practice, the sender only knows some descriptive attributes of the receivers. Secondly, the receiver cannot be guaranteed to only receive messages from the legal senders. Therefore, it remains an elusive and challenging research problem on how to design a DTS scheme where the sender can send messages to the unknown receivers and the receiver can filter out false messages according to the described attributes. In this paper, we propose an attribute-based data transfer with filtering (ABDTF) scheme to address these problems. In our proposed scheme, the receiver can publish an access structure so that only the users whose attributes satisfy this access structure can send messages to him. Furthermore, the sender can encrypt a message under a set of attributes such that only the users who hold these attributes can obtain the message. In particular, we provide an efficient filtering algorithm for the receiver to resist the denial-of-service attacks. Notably, we propose the formal definition and security models for ABDTF schemes. To the best of our knowledge, it is the first time that a provable ABDTF scheme is proposed. Hence, this work provides a new research approach to ABDTF schemes.

    must know who are the real receivers. This is undesirable in a system where the

    number of the users is very large, such as cloud computing. In practice, the sender

    only knows some descriptive attributes of the receivers. Second, the receiver

    cannot be guaranteed to only receive messages from the legal senders. Therefore,

    it remains an elusive and challenging research problem on how to design a DTS

    scheme where the sender can send messages to the unknown receivers and the

    receiver can filter out false messages according to the described attributes. In

    this paper, we propose an attribute-based data transfer with filtering (ABDTF)

    scheme to address these problems. In our proposed scheme, the receiver can

    publish an access structure so that only the users whose attributes satisfy this

    access structure can send messages to him. Furthermore, the sender can encrypt

    a message under a set of attributes such that only the users who hold these

    attributes can obtain the message. In particular, we provide an efficient filtering

    algorithm for the receiver to resist the denial-of-service (DoS) attacks. Notably,

    we propose the formal definition and security models for ABDTF schemes. To

    the best of our knowledge, it is the first time that a provable ABDTF scheme is

    proposed. Hence, this work provides a new research approach to ABDTF schemes.

Publication Date


  • 2014

Citation


  • Han, J., Susilo, W., Mu, Y. & Yan, J. (2014). Attribute-based data transfer with filtering scheme in cloud computing. The Computer Journal, 57 (4), 579-591.

Scopus Eid


  • 2-s2.0-84897447177

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=3272&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/2263

Number Of Pages


  • 12

Start Page


  • 579

End Page


  • 591

Volume


  • 57

Issue


  • 4

Abstract


  • Data transfer is a transmission of data over a point-to-point or point-to-multipoint

    communication channel. To protect the confidentiality of the transferred data,

    public-key cryptography has been introduced in data transfer schemes (DTSs).

    Data transfer is a transmission of data over a point-to-point or point-to-multipoint communication channel. To protect the confidentiality of the transferred data, public-key cryptography has been introduced in data transfer schemes (DTSs). Unfortunately, there exist some drawbacks in the current DTSs. First, the sender must know who the real receivers are. This is undesirable in a system where the number of the users is very large, such as cloud computing. In practice, the sender only knows some descriptive attributes of the receivers. Secondly, the receiver cannot be guaranteed to only receive messages from the legal senders. Therefore, it remains an elusive and challenging research problem on how to design a DTS scheme where the sender can send messages to the unknown receivers and the receiver can filter out false messages according to the described attributes. In this paper, we propose an attribute-based data transfer with filtering (ABDTF) scheme to address these problems. In our proposed scheme, the receiver can publish an access structure so that only the users whose attributes satisfy this access structure can send messages to him. Furthermore, the sender can encrypt a message under a set of attributes such that only the users who hold these attributes can obtain the message. In particular, we provide an efficient filtering algorithm for the receiver to resist the denial-of-service attacks. Notably, we propose the formal definition and security models for ABDTF schemes. To the best of our knowledge, it is the first time that a provable ABDTF scheme is proposed. Hence, this work provides a new research approach to ABDTF schemes.

    must know who are the real receivers. This is undesirable in a system where the

    number of the users is very large, such as cloud computing. In practice, the sender

    only knows some descriptive attributes of the receivers. Second, the receiver

    cannot be guaranteed to only receive messages from the legal senders. Therefore,

    it remains an elusive and challenging research problem on how to design a DTS

    scheme where the sender can send messages to the unknown receivers and the

    receiver can filter out false messages according to the described attributes. In

    this paper, we propose an attribute-based data transfer with filtering (ABDTF)

    scheme to address these problems. In our proposed scheme, the receiver can

    publish an access structure so that only the users whose attributes satisfy this

    access structure can send messages to him. Furthermore, the sender can encrypt

    a message under a set of attributes such that only the users who hold these

    attributes can obtain the message. In particular, we provide an efficient filtering

    algorithm for the receiver to resist the denial-of-service (DoS) attacks. Notably,

    we propose the formal definition and security models for ABDTF schemes. To

    the best of our knowledge, it is the first time that a provable ABDTF scheme is

    proposed. Hence, this work provides a new research approach to ABDTF schemes.

Publication Date


  • 2014

Citation


  • Han, J., Susilo, W., Mu, Y. & Yan, J. (2014). Attribute-based data transfer with filtering scheme in cloud computing. The Computer Journal, 57 (4), 579-591.

Scopus Eid


  • 2-s2.0-84897447177

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=3272&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/2263

Number Of Pages


  • 12

Start Page


  • 579

End Page


  • 591

Volume


  • 57

Issue


  • 4