Phe: An efficient traitor tracing and revocation for encrypted file syncing-and-sharing in cloud

Yan Zhu, Guohua Gan, Ruiqi Guo, Dijiang Huang

Research output: Contribution to journalArticlepeer-review

8 Scopus citations


Recently, many enterprises have moved their data into the cloud by using file syncing and sharing (FSS) services, which have been deployed for mobile users. However, Bring-Your-Own-Device (BYOD) solutions for increasingly deployed mobile devices have also in fact raised a new challenge for how to prevent users from abusing the FSS service. In this paper, we address this issue by using a new system model involving anomaly detection, tracing, and revocation approaches. The presented solution applies a new threshold public key based cryptosystem, called partially-ordered hierarchical encryption (PHE), which implements a partial-order key hierarchy and it is similar to role hierarchy widely used in RBAC. PHE provides two main security mechanisms, i.e., traitor tracing and key revocation, which can greatly improve the efficiency compared to previous approaches. The security and performance analysis shows that PHE is a provably secure threshold encryption and provides following salient management and performance benefits: it can promise to efficiently trace all possible traitor coalitions and support public revocation not only for the users but for the specified groups.

Original languageEnglish (US)
Article number7479486
Pages (from-to)1110-1124
Number of pages15
JournalIEEE Transactions on Cloud Computing
Issue number4
StatePublished - Oct 1 2018


  • Cloud storage
  • File syncing-and-sharing
  • Partial order key hierarchy
  • Revocation
  • Security
  • Traitor tracing

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications


Dive into the research topics of 'Phe: An efficient traitor tracing and revocation for encrypted file syncing-and-sharing in cloud'. Together they form a unique fingerprint.

Cite this