Comment on “Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things”

Citation

Tan, Syh Yuan (2018) Comment on “Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things”. IEEE Access, 6. pp. 22464-22465. ISSN 2169-3536

[img] Text
42.pdf
Restricted to Repository staff only

Download (243kB)

Abstract

In this comment paper, we point out a security flaw in a data access control system which is built on ciphertext-policy attribute-based encryption (CP-ABE) and attribute-based signature schemes. In particular, we show that the underlying CP-ABE is vulnerable to the collusion attack. As a result, malicious users can collaborate to decrypt a ciphertext, which they are not authorized to decrypt.

Item Type: Article
Uncontrolled Keywords: Data encryption (Computer science), Access control, ciphertex-policy, attribute-based, encryption, cryptanalysis, fog computing
Subjects: Q Science > QA Mathematics > QA71-90 Instruments and machines > QA75.5-76.95 Electronic computers. Computer science
Divisions: Faculty of Information Science and Technology (FIST)
Depositing User: Ms Rosnani Abd Wahab
Date Deposited: 09 Nov 2020 19:33
Last Modified: 09 Nov 2020 19:33
URII: http://shdl.mmu.edu.my/id/eprint/7287

Downloads

Downloads per month over past year

View ItemEdit (login required)