Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jianan Hong is active.

Publication


Featured researches published by Jianan Hong.


IEEE Transactions on Information Forensics and Security | 2017

RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage

Kaiping Xue; Yingjie Xue; Jianan Hong; Wei Li; Hao Yue; David S. L. Wei; Peilin Hong

Data access control is a challenging issue in public cloud storage systems. Ciphertext-policy attribute-based encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained, and secure data access control for cloud storage with honest-but-curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence, it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a large-scale cloud storage system. Users may be stuck in the waiting queue for a long period to obtain their secret keys, thereby resulting in low efficiency of the system. Although multi-authority access control schemes have been proposed, these schemes still cannot overcome the drawbacks of single-point bottleneck and low efficiency, due to the fact that each of the authorities still independently manages a disjoint attribute set. In this paper, we propose a novel heterogeneous framework to remove the problem of single-point performance bottleneck and provide a more efficient access control scheme with an auditing mechanism. Our framework employs multiple attribute authorities to share the load of user legitimacy verification. Meanwhile, in our scheme, a central authority is introduced to generate secret keys for legitimacy verified users. Unlike other multi-authority access control schemes, each of the authorities in our scheme manages the whole attribute set individually. To enhance security, we also propose an auditing mechanism to detect which attribute authority has incorrectly or maliciously performed the legitimacy verification procedure. Analysis shows that our system not only guarantees the security requirements but also makes great performance improvement on key generation.


IEEE Transactions on Information Forensics and Security | 2017

Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving

Kaiping Xue; Shaohua Li; Jianan Hong; Yingjie Xue; Nenghai Yu; Peilin Hong

Industries and individuals outsource database to realize convenient and low-cost applications and services. In order to provide sufficient functionality for SQL queries, many secure database schemes have been proposed. However, such schemes are vulnerable to privacy leakage to cloud server. The main reason is that database is hosted and processed in cloud server, which is beyond the control of data owners. For the numerical range query (“>,” “<,” and so on), those schemes cannot provide sufficient privacy protection against practical challenges, e.g., privacy leakage of statistical properties, access pattern. Furthermore, increased number of queries will inevitably leak more information to the cloud server. In this paper, we propose a two-cloud architecture for secure database, with a series of intersection protocols that provide privacy preservation to various numeric-related range queries. Security analysis shows that privacy of numerical information is strongly protected against cloud providers in our proposed scheme.


IEEE Transactions on Information Forensics and Security | 2015

Comments on “DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems”/Security Analysis of Attribute Revocation in Multiauthority Data Access Control for Cloud Storage Systems

Jianan Hong; Kaiping Xue; Wei Li

In the above paper, Yang et al. have proposed a multi-authority ciphertext-policy attribute-based encryption-based data access control for cloud storage, in which the authors claimed that the mechanism in dealing with attribute revocation could achieve both forward security and backward security. Unfortunately, our further analysis and investigation show that their work adopts a bidirectional re-encryption method in ciphertext updating, so a security vulnerability appears. Our proposed attack method demonstrates that a revoked user can still decrypt new ciphertexts that are claimed to require the new-version secret keys to decrypt.


global communications conference | 2014

TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud

Jianan Hong; Kaiping Xue; Wei Li; Yingjie Xue

The new paradigm of outsourcing data to the cloud is a double-edged sword. On one side, it frees up data owners from the technical management, and is easier for the data owners to share their data with intended recipients when data are stored in the cloud. On the other side, it brings about new challenges about privacy and security protection. To protect data confidentiality against the honest-but-curious cloud service provider, numerous works have been proposed to support fine-grained data access control. However, till now, no efficient schemes can provide the scenario of fine-grained access control together with the capacity of time-sensitive data publishing. In this paper, by embedding the mechanism of timed-release encryption into CP-ABE (Ciphertext-Policy Attribute-based Encryption), we propose TAFC: a new time and attribute factors combined access control on time-sensitive data stored in cloud. Extensive security and performance analysis shows that our proposed scheme is highly efficient and satisfies the security requirements for time-sensitive data storage in public cloud.


IEEE Transactions on Services Computing | 2017

TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud

Jianan Hong; Kaiping Xue; Yingjie Xue; Weikeng Chen; David S. L. Wei; Nenghai Yu; Peilin Hong

The new paradigm of outsourcing data to the cloud is a double-edged sword. On the one hand, it frees data owners from the technical management, and is easier for data owners to share their data with intended users. On the other hand, it poses new challenges on privacy and security protection. To protect data confidentiality against the honest-but-curious cloud service provider, numerous works have been proposed to support fine-grained data access control. However, till now, no schemes can support both fine-grained access control and time-sensitive data publishing. In this paper, by embedding timed-release encryption into Ciphertext-Policy Attribute-based Encryption (CP-ABE), we propose a new time and attribute factors combined access control on time-sensitive data for public cloud storage (named TAFC). Based on the proposed scheme, we further propose an efficient approach to design access policies faced with diverse access requirements for time-sensitive data. Extensive security and performance analysis shows that our proposed scheme is highly efficient and satisfies the security requirements for time-sensitive data storage in public cloud.


IEEE Transactions on Parallel and Distributed Systems | 2016

TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

Wei Li; Kaiping Xue; Yingjie Xue; Jianan Hong


IEEE Transactions on Computers | 2017

CABE: A New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding

Kaiping Xue; Jianan Hong; Yingjie Xue; David S. L. Wei; Nenghai Yu; Peilin Hong


global communications conference | 2016

LABAC: A Location-Aware Attribute-Based Access Control Scheme for Cloud Storage

Yingjie Xue; Jianan Hong; Wei Li; Kaiping Xue; Peilin Hong


international conference on communications | 2018

LASA: Lightweight, Auditable and Secure Access Control in ICN with Limitation of Access Times

Peixuan He; Yinxin Wan; Qiudong Xia; Shaohua Li; Jianan Hong; Kaiping Xue


IEEE Transactions on Information Forensics and Security | 2018

Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage

Kaiping Xue; Weikeng Chen; Wei Li; Jianan Hong; Peilin Hong

Collaboration


Dive into the Jianan Hong's collaboration.

Top Co-Authors

Avatar

Kaiping Xue

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Peilin Hong

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Yingjie Xue

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Wei Li

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nenghai Yu

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Weikeng Chen

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Shaohua Li

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Hao Yue

San Francisco State University

View shared research outputs
Top Co-Authors

Avatar

Qingyou Yang

University of Science and Technology of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge