[1] NIST S P. A NIST definition of cloud computing[J]. Communications of the ACM, 2015, 53(6):50. [2] WOOD T, RAMAKRISHNAN K K, SHENOY P, et al. CloudNet:dynamic pooling of cloud resources by live WAN migration of virtual machines[J]. IEEE/ACM Transactions on Networking, 2015, 23(5):1568-1583. [3] CHOO K K R. Cloud computing:challenges and future directions[J]. Trends & Issues in Crime & Criminal Justice, 2010(400):1-6. [4] ESPOSITO C, CASTIGLIONE A, MARTINI B, et al. Cloud manufacturing:security, privacy, and forensic concerns[J]. IEEE Cloud Computing, 2016, 3(4):16-22. [5] SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//Proceedings of the 2005 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin:Springer, 2005:457-473. [6] BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security & Privacy. Piscataway, NJ:IEEE, 2007:321-334. [7] GOVAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 200613th ACM Conference on Computer and Communications Security. New York:ACM, 2006:89-98. [8] TOUATI L, CHALLAL Y. Batch-based CP-ABE with attribute revocation mechanism for the Internet of things[C]//Proceedings of the 2015 International Conference on Computing, Networking and Communications. Piacataway, NJ:IEEE, 2015:1044-1049. [9] BOLDYREVA A, GOYAL V, KUMAR V. Identity-based encryption with efficient revocation[C]//Proceedings of the 200815th ACM Conference on Computer and Communications Security. New York:ACM, 2008:417-426. [10] YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[C]//Proceedings of the 20105th ACM Symposium on Information, Computer and Communications Security. New York:ACM, 2010:261-270. [11] TYSOWSKI P K, HASAN M A. Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds[J]. IEEE Transactions on Cloud Computing, 2013, 1(2):172-186. [12] LI J G, YAO W, ZHANG Y C, et al. Flexible and fine-grained attribute-based data storage in cloud computing[J]. IEEE Transactions on Services Computing, 2017, 10(5):785-796. [13] XU X L, ZHOU J L, WANG X H, et al. Multi-authority proxy re-encryption based on CPABE for cloud storage systems[J]. Journal of Systems Engineering and Electronics, 2016, 27(1):211-223. [14] 闫玺玺,孟慧.支持直接撤销的密文策略属性基加密方案[J].通信学报,2016,37(5):44-50.(YAN X X, MENG H. Ciphertext policy attribute-based encryption scheme supporting direct revocation[J]. Journal on Communications, 2016, 37(5):44-50.) [15] ZHANG Y H, CHEN X F, LI J, et al. Anonymous attribute-based encryption supporting efficient decryption test[C]//Proceedings of the 20138th ACM SIGSAC Symposium on Information, Computer and Communications Security. New York:ACM, 2013:511-516. [16] LIU X M, MA J, XIONG J B, et al. Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data[J]. International Journal of Network Security, 2014, 16(6):437-443. [17] WANG S L, LIANG K T, LIU J K, et al. Attribute-based data sharing scheme revisited in cloud computing[J]. IEEE Transactions on Information Forensics & Security, 2016, 11(8):1661-1673. [18] XIE X X, MA H, LI J, et al. An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing[J]. Journal of Universal Computer Science, 2013, 19(16):2349-2367. [19] DAN B. The decision Diffie-Hellman problem[C]//Proceedings of the 19983rd International Symposium on Algorithmic Number Theory, LNCS 1423. London:Springer, 1998:48-63. |