{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:35:52Z","timestamp":1771961752355,"version":"3.50.1"},"reference-count":46,"publisher":"MDPI AG","issue":"17","license":[{"start":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T00:00:00Z","timestamp":1597968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61602080, No. 61602084"],"award-info":[{"award-number":["No. 61602080, No. 61602084"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangxi Key Laboratory of Cryptography and Information Security","award":["No. GCIS201718"],"award-info":[{"award-number":["No. GCIS201718"]}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["No. LY19F020045"],"award-info":[{"award-number":["No. LY19F020045"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Opening Project of Guangdong Provincial Key Laboratory of Information Security Technology","award":["No. 2017B030314131-05"],"award-info":[{"award-number":["No. 2017B030314131-05"]}]},{"name":"the Department of Education of Zhejiang Province of China","award":["No. Y201636547"],"award-info":[{"award-number":["No. Y201636547"]}]},{"name":"the Key Research Project of Zhejiang Province","award":["No. 2017C01062"],"award-info":[{"award-number":["No. 2017C01062"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the explosion of various mobile devices and the tremendous advancement in cloud computing technology, mobile devices have been seamlessly integrated with the premium powerful cloud computing known as an innovation paradigm named Mobile Cloud Computing (MCC) to facilitate the mobile users in storing, computing and sharing their data with others. Meanwhile, Attribute Based Encryption (ABE) has been envisioned as one of the most promising cryptographic primitives for providing secure and flexible fine-grained \u201cone to many\u201d access control, particularly in large scale distributed system with unknown participators. However, most existing ABE schemes are not suitable for MCC because they involve expensive pairing operations which pose a formidable challenge for resource-constrained mobile devices, thus greatly delaying the widespread popularity of MCC. To this end, in this paper, we propose a secure and lightweight fine-grained data sharing scheme (SLFG-DSS) for a mobile cloud computing scenario to outsource the majority of time-consuming operations from the resource-constrained mobile devices to the resource-rich cloud servers. Different from the current schemes, our novel scheme can enjoy the following promising merits simultaneously: (1) Supporting verifiable outsourced decryption, i.e., the mobile user can ensure the validity of the transformed ciphertext returned from the cloud server; (2) resisting decryption key exposure, i.e., our proposed scheme can outsource decryption for intensive computing tasks during the decryption phase without revealing the user\u2019s data or decryption key; (3) achieving a CCA security level; thus, our novel scheme can be applied to the scenarios with higher security level requirement. The concrete security proof and performance analysis illustrate that our novel scheme is proven secure and suitable for the mobile cloud computing environment.<\/jats:p>","DOI":"10.3390\/s20174720","type":"journal-article","created":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T09:21:51Z","timestamp":1598001711000},"page":"4720","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4475-8310","authenticated-orcid":false,"given":"Haifeng","family":"Li","sequence":"first","affiliation":[{"name":"School of Software, Dalian University of Technology, Dalian 116024, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7702-8173","authenticated-orcid":false,"given":"Caihui","family":"Lan","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Lanzhou City University, Lanzhou 730070, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0025-8883","authenticated-orcid":false,"given":"Xingbing","family":"Fu","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin 541004, China"},{"name":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China"},{"name":"Guangdong Provincial Key Laboratory of Information Security Technology, Guangzhou 510275, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9957-7664","authenticated-orcid":false,"given":"Caifen","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6289-1265","authenticated-orcid":false,"given":"Fagen","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}]},{"given":"He","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Software, Dalian University of Technology, Dalian 116024, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,8,21]]},"reference":[{"key":"ref_1","unstructured":"Mell, P., and Grance, T. (2020, August 20). The NIST Definition of Cloud Computing, Available online: http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-145.pdf."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/j.im.2004.07.001","article-title":"What drives mobile commerce?: An empirical evaluation of the revised technology acceptance model","volume":"42","author":"Wu","year":"2005","journal-title":"Inf. Manag."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Nugraha, A., Supangkat, S.H., and Nugroho, D. (2012, January 26\u201327). Goesmart: Social media education in cloud computing. Proceedings of the 2012 International Conference on Cloud Computing and Social Networking (ICCCSN), West Java, Indonesia.","DOI":"10.1109\/ICCCSN.2012.6215746"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1166\/jmihi.2015.1437","article-title":"Femto-cloud based secure and economic distributed diagnosis and home health care system","volume":"5","author":"De","year":"2015","journal-title":"J. Med. Imaging Health Inform."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1002\/wcm.1203","article-title":"A survey of mobile cloud computing: Architecture, applications, and approaches","volume":"13","author":"Dinh","year":"2013","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.future.2012.05.023","article-title":"Mobile cloud computing: A survey","volume":"29","author":"Fernando","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11036-013-0477-4","article-title":"Mobile cloud computing: A survey, state of art and future directions","volume":"19","author":"Rahimi","year":"2014","journal-title":"Mob. Networks Appl."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MWC.2013.6549279","article-title":"Gearing resource-poor mobile devices with powerful clouds: Architectures, challenges, and applications","volume":"20","author":"Liu","year":"2013","journal-title":"IEEE Wirel. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/SURV.2013.070813.00285","article-title":"Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges","volume":"16","author":"Abolfazli","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_10","first-page":"393","article-title":"A survey of mobile cloud computing application models","volume":"16","author":"Othman","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_11","unstructured":"Shamir, A. (1984). Identity-based cryptosystems and signature schemes. Workshop on the Theory and Application of Cryptographic Techniques, Springer."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Sahai, A., and Waters, B. (2005). Fuzzy identity-based encryption. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/11426639_27"},{"key":"ref_13","unstructured":"Goyal, V., Pandey, O., Sahai, A., and Waters, B. (November, January 30). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP\u201907), Berkeley, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"7325","DOI":"10.1007\/s00500-016-2271-2","article-title":"Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing","volume":"21","author":"Wang","year":"2017","journal-title":"Soft Comput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1007\/s00500-017-2482-1","article-title":"Fuzzy encryption in cloud computation: Efficient verifiable outsourced attribute-based encryption","volume":"22","author":"Li","year":"2018","journal-title":"Soft Comput."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Chase, M., and Chow, S.S. (2009, January 7\u201311). Improving privacy and security in multi-authority attribute-based encryption. Proceedings of the 16th ACM Conference on Computer and Communications Security, Hong Kong, China.","DOI":"10.1145\/1653662.1653678"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.future.2014.11.016","article-title":"A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing","volume":"52","author":"Liang","year":"2015","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1007\/s10207-014-0270-9","article-title":"Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation","volume":"14","author":"Qian","year":"2015","journal-title":"Int. J. Inf. Secur."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1109\/TSC.2016.2520932","article-title":"Flexible and fine-grained attribute-based data storage in cloud computing","volume":"10","author":"Li","year":"2016","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. International Workshop on Public Key Cryptography, Springer.","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1951","DOI":"10.1109\/TC.2013.83","article-title":"Arbitrary-state attribute-based encryption with dynamic membership","volume":"63","author":"Fan","year":"2013","journal-title":"IEEE Trans. Comput."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.jss.2017.10.020","article-title":"Large universe attribute based access control with efficient decryption in cloud storage system","volume":"135","author":"Fu","year":"2018","journal-title":"J. Syst. Softw."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"e2942","DOI":"10.1002\/dac.2942","article-title":"Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage","volume":"30","author":"Li","year":"2017","journal-title":"Int. J. Commun. Syst."},{"key":"ref_25","unstructured":"Green, M., Hohenberger, S., and Waters, B. (2011). Outsourcing the decryption of abe ciphertexts. USENIX Security Symposium, USENIX Association."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","article-title":"Attribute-based encryption with verifiable outsourced decryption","volume":"8","author":"Lai","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1109\/TSC.2017.2710190","article-title":"Full verifiability for outsourced decryption in attribute based encryption","volume":"13","author":"Li","year":"2017","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"3596205","DOI":"10.1155\/2017\/3596205","article-title":"Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length","volume":"2017","author":"Li","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Wang, H., Yang, B., and Wang, Y. (2015, January 25\u201327). Server aided ciphertext-policy attribute-based encryption. Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, Gwangju, Korea.","DOI":"10.1109\/WAINA.2015.11"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1016\/j.jss.2016.12.018","article-title":"Fine-grained access control system based on fully outsourced attribute-based encryption","volume":"125","author":"Zhang","year":"2017","journal-title":"J. Syst. Softw."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Liao, Y., He, Y., Li, F., Jiang, S., and Zhou, S. (2018). Analysis of an ABE scheme with verifiable outsourced decryption. Sensors, 18.","DOI":"10.3390\/s18010176"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.ins.2019.03.053","article-title":"(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance","volume":"490","author":"Qin","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Ali, M., Sadeghi, M.R., and Liu, X. (2020). Lightweight Fine-Grained Access Control for Wireless Body Area Networks. Sensors, 20.","DOI":"10.3390\/s20041088"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/TDSC.2017.2729556","article-title":"Lightweight sharable and traceable secure mobile health system","volume":"17","author":"Yang","year":"2020","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"4884","DOI":"10.1007\/s11227-018-2644-7","article-title":"An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud","volume":"76","author":"Guo","year":"2020","journal-title":"J. Supercomput."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"3561","DOI":"10.3934\/mbe.2019178","article-title":"Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing","volume":"16","author":"Kibiwott","year":"2019","journal-title":"Math. Biosci. Eng."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Zhang, S., Li, W., Wen, Q., Zhang, H., and Jin, Z. (2020). A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation. Wirel. Pers. Commun., to be published.","DOI":"10.1007\/s11277-020-07503-y"},{"key":"ref_38","unstructured":"Gentry, C. (June, January 31). Fully homomorphic encryption using ideal lattices. Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Gentry, C., and Halevi, S. (2011). Implementing gentry\u2019s fully-homomorphic encryption scheme. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/978-3-642-20465-4_9"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1137\/120868669","article-title":"Efficient fully homomorphic encryption from (standard) LWE","volume":"43","author":"Brakerski","year":"2014","journal-title":"SIAM J. Comput."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Gennaro, R., Gentry, C., and Parno, B. (2010). Non-interactive verifiable computing: Outsourcing computation to untrusted workers. Annual Cryptology Conference, Springer.","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Chung, K.M., Kalai, Y., and Vadhan, S. (2010). Improved delegation of computation using fully homomorphic encryption. Annual Cryptology Conference, Springer.","DOI":"10.1007\/978-3-642-14623-7_26"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Jin, F., Zhu, Y., and Luo, X. (2012, January 21\u201323). Verifiable fully homomorphic encryption scheme. Proceedings of the 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), Yichang, China.","DOI":"10.1109\/CECNet.2012.6202046"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Li, J., Chen, X., Li, J., Jia, C., Ma, J., and Lou, W. (2013). Fine-grained access control system based on outsourced attribute-based encryption. European Symposium on Research in Computer Security, Springer.","DOI":"10.1007\/978-3-642-40203-6_33"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.jpdc.2019.09.008","article-title":"A secure and efficient outsourced computation on data sharing scheme for privacy computing","volume":"135","author":"Fan","year":"2020","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","article-title":"Charm: A framework for rapidly prototyping cryptosystems","volume":"3","author":"Akinyele","year":"2013","journal-title":"J. Cryptogr. Eng."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/17\/4720\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:04:36Z","timestamp":1760177076000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/17\/4720"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,21]]},"references-count":46,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2020,9]]}},"alternative-id":["s20174720"],"URL":"https:\/\/doi.org\/10.3390\/s20174720","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,21]]}}}