| Due to the booming of the Internet,cloud computing technology has used widely.To expand the commercial use of cloud computing,more and more researchers are focusing on its extension:cloud storage and fog computing.However,the security and privacy of data are still the main obstacles restricting the development of cloud storage and fog computing technology.The attribute-based encryption(ABE)is one of the research hotspots to solve its obstacles.In the traceable ABE scheme,the system can quickly find this malicious authorized user,who may leak his/her decryption privilege to the third party.In the keyword searchable ABE scheme,users can quickly find the data they are interested in.However,none of the existing traceable ABE scheme and the keyword searchable ABE scheme take into accounts the revocation of malicious/unauthorized users.To solve the above problems,this paper proposes a research encryption scheme of identity traceable and keyword searchable under cloud storage.The mainly work is described as follows:(1)We construct an identity traceable and attribute revocable ABE scheme under cloud storage.For the malicious users who have leaked key information in the system,the scheme has the ability to trace his/her identity and performs attribute revocation.At the same time,the scheme allows secret key updates and ciphertext updates to resist collusion attacks between users.Outsourcing encryption,decryption and attribute revocation are used to reduce the computational burden on the data owner,the data user and the trust authority,respectively.The experiment has shown that the local decryption cost of our scheme is a constant,which is more suitable for commercial applications.In addition,the security proof of the scheme is given.(2)We construct an attribute-based encryption scheme for fine-grained search and key update under fog computing.The scheme adopts a linear secret sharing scheme as the access policy.The scheme enjoys a fine-grained search and supports multi-keywords search.In order to make unauthorized users lose the search privilege and decrypt privilege,the scheme supports key updates.In the trapdoor generation phase and data decryption phase,the fog nodes participate in calculation to reduce the computational burden on the terminal devices.Experiments have shown that the user key and decryption cost are the constant.In addition,the scheme can achieve security of selected plaintext attacks and chosen keyword attacks. |