location:Home > 2018 Vol.1 Aug No.4 > Position Mobil Information Encryption Algorithm Based on Key Attributes of Reduced Rank Agent under Cloud Storage

2018 Vol.1 Aug No.4

  • Title: Position Mobil Information Encryption Algorithm Based on Key Attributes of Reduced Rank Agent under Cloud Storage
  • Name: Kelvin Blanche
  • Company: Nyenrode Business Universiteit, Holland
  • Abstract:

    The location mobile social networks information privacy protection under the environment of cloud storage and data security of encryption is researched, the traditional data encryption to rank has higher in the length of ciphertext and private key attributes of large matrix, it defines the length of ciphertext data on customer privacy private property and it cannot be revoked. The encryption complexity and security are not good. Encryption algorithm based on key attributes of reduced rank agent is proposed, the proxy re encryption technology is taken, we design of ReEncrypt decryption scheme, and private key attributes of bilinear mapping and reduced rank processing is taken, and a communication channel between the user, CSP, trusted third party and data users is established, and the algorithm is obtained. The simulation is taken for testing the customer information data for privacy protection, the simulation results show that it can ensure the length of ciphertext is relatively small it has low computational complexity with more security, and it has the very good practical value in encryption communication and privacy protection fields.

  • Keyword: key; encryption algorithm, cloud storage; privacy protection
  • DOI: 10.12250/jpciams2018040112
  • Citation form: Kelvin Blanche.Position Mobil Information Encryption Algorithm Based on Key Attributes of Reduced Rank Agent under Cloud Storage[J]. Computer Informatization and Mechanical System, 2018, vol. 1, pp. 39-45.
Reference:

[1] Feng D G, Zhang M, Zhang W. Research on Cloud Computing Security[J]. Journal of Software, 2011, 22(1): 71-83.
[2] Wang X J, Zhang W, Chen Q. An attribute-based encryption scheme with efficient attribute revocation[J]. Journal of Computer Applications, 2012, 32(S1):39-43.
[3] Liu F, Yang M. A ciphertext policy attribute-based encryption scheme for cloud storage[J]. Journal of Computer Applications, 2012, 29(4): 1452-1456.
[4] Yu S, Wang C, Ren K, et al. Attribute based data sharing with attribute revocation[C]. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, 2010: 261-270.
[5] He Y C, Wang X Z, Liu K Q, et al. Convergence Analysis and Algorithm Improvement of Differential Evolution[J]. Journal of Software, 2010, 21(5): 875-885.

Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16