Meanwhile, by outsourcing most of the computation
overheads to the encryption and decryption cloud
services, mobile devices can easily complete the
data processing operations.
ACKNOWLEDGEMENTS
This work was supported by the Youth Talent
Project of the Science and Technology Research
Program of Hubei Provincial Education Department
under Grant No. Q20151111, and Young Scientist
Foundation of Wuhan University of Science and
Technology under Grant No. 2013xz012, No.
2014xz019, and No.2015XG005.
REFERENCES
Mell, P., Grance, T., 2011. The NIST definition of cloud
computing, NIST Special Publication 800-145.
Chen, D., Zhao, H., 2012. Data security and privacy
protection issues in cloud computing. In Proceedings
of the 1st International Conference on Computer
Science and Electronics Engineering, pp. 647-651.
IEEE Computer Society.
Yu, S., Wang, C., Ren, K., Lou, W., 2010. Achieving
secure, scalable, and fine-grained data access control
in cloud computing. In Proceedings of the 29th
International Conference on Computer
Communications, pp. 1-9. IEEE Computer Society.
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q.,
Fu, K., 2003. Plutus: scalable secure file sharing on
untrusted storage. In Proceedings of the 2nd
Conference on File and Storage Technologies, pp. 29-
42.
Di Vimercati, S. D. C., Foresti, S., Jajodia, S., Paraboschi,
S., Samarati, P., 2007. Over-encryption: management
of access control evolution on outsourced data. In
Proceedings of the 33rd International Conference on
Very Large Data Bases, pp. 123-134. VLDB
endowment.
Bethencourt, J., Sahai, A., Waters, B., 2007. Ciphertext-
policy attribute-based encryption. In Proceedings of
the 28th IEEE Symposium on Security and Privacy,
pp. 321-334. IEEE Computer Society.
Hur, J., Noh, D. K., 2011. Attribute-based access control
with efficient revocation in data outsourcing systems.
IEEE Transactions on Parallel and Distributed
Systems, 22(7), pp. 1214-1221. IEEE Computer
Society.
Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., Jonker,
W., 2009. Mediated ciphertext-policy attribute-based
encryption and its application. In Proceedings of the
International Conference on Information Security
Applications, pp. 309-323. Springer Berlin Heidelberg.
Wang, G., Liu, Q., Wu, J., 2010. Hierarchical attribute-
based encryption for fine-grained access control in
cloud storage services. In Proceedings of the 17th
ACM Conference on Computer and Communications
Security, pp. 735-737. ACM Press.
Sahai, A., Waters, B., 2005. Fuzzy identity-based
encryption. In Proceedings of the 24th Annual
International Conference on the Theory and
Applications of Cryptographic Techniques, pp. 457-
473. Springer Berlin Heidelberg.
Shamir, A., 1979. How to share a secret. Communications
of the ACM, 22(11), pp. 612-613. ACM Press.
Ibraimi, L., Tang, Q., Hartel, P., Jonker, W., 2009.
Efficient and provable secure ciphertext-policy
attribute-based encryption schemes. In Proceedings of
the 5th International Conference on Information
Security Practice and Experience, pp. 1-12. Springer
Berlin Heidelberg.
Achieving Lightweight and Fine-grained Access Control in Mobile Cloud Computing
515