Next Article in Journal
SEMA: Self-Evolving Multi-Agent Auditing for Smart Contracts
Previous Article in Journal
Impact of EU Laws and Regulations on the Adoption of Artificial Intelligence in Cyber–Physical Systems: A Review of Regulatory Barriers, Technological Challenges, and Cross-Sector Implications
Previous Article in Special Issue
A Methodology for Quantitative Security Evaluation of Operating Systems: Scenario-Based Comparison of Qubes OS and Windows 11
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Hierarchical Key Management Scheme for Efficient Outsourced Computation in Cloud Storage Services

1
Department of Information Management, Lunghwa University of Science and Technology, Taoyuan 33306, Taiwan
2
Department of Management Information Systems, National Chung Hsing University, Taichung 40402, Taiwan
3
Department of Computer Science, University of Taipei, Taipei 10048, Taiwan
4
Department of Computer Science and Information Engineering, Asia University, Taichung 41354, Taiwan
5
Department of Medical Research, China Medical University Hospital, China Medical University, Taichung 40402, Taiwan
*
Author to whom correspondence should be addressed.
Electronics 2026, 15(10), 2185; https://doi.org/10.3390/electronics15102185
Submission received: 17 April 2026 / Revised: 14 May 2026 / Accepted: 15 May 2026 / Published: 19 May 2026

Abstract

This study addresses the high computational overhead associated with updating encryption keys and authentication information by delegating these tasks to cloud storage services. This approach reduces the burden on data owners and facilitates the establishment of a robust cloud storage ecosystem. Our evaluation focuses on three critical performance metrics for cloud security mechanisms: 1. Computational Complexity: The processing time and frequency required for encryption, decryption, and verification. 2. Communication Complexity: The volume and length of message exchanges. 3. Storage Overhead: The space required to maintain a comprehensive cloud storage system. We propose a hierarchical key management scheme that enables data owners to update file encryption keys efficiently without impacting other users within the Cloud Storage Service (CSS) environment. By eliminating the need for owners to store all keys in a hierarchical tree, our scheme minimizes the computational cost of key updates. Ultimately, this approach enhances efficiency for both data owners and receivers, making it particularly suitable for resource-constrained mobile devices.

1. Introduction

Recently, cloud computing has emerged as a pivotal paradigm in science and technology, with numerous providers launching diverse cloud-based solutions [1,2], such as Amazon EC2/S3 [3] and Microsoft Azure. Among these, cloud storage services (CSS) are the most widely adopted by general users, exemplified by platforms like Dropbox, SkyDrive, Amazon S3, and Google Drive [4]. Driven by the principles of on-demand network access and ubiquitous availability, mobile devices—particularly smartphones and tablets—have become indispensable tools for accessing these services. Consequently, providers have increasingly released dedicated mobile client applications to enhance user convenience. However, these mobile platforms often prioritize accessibility over robust security mechanisms. Even when security is implemented, the associated computational and storage overhead must remain minimal due to the inherent constraints of mobile devices, such as limited processing power, bandwidth, and battery life. Therefore, the development of lightweight security protocols has become a critical research imperative [5,6].
The primary objectives of cloud storage services are twofold: to enable ubiquitous file access and to facilitate secure data sharing among authorized users. Consequently, implementing efficient access control remains a critical security challenge within the cloud storage domain [7]. Current research generally categorizes access control mechanisms into three primary types: Access Control Lists (ACL), Attribute-Based Access Control (ABAC), and File Groups.
  • Access Control Lists (ACL): A file-centric approach where each data object maintains a record of users authorized for access [8].
  • Attribute-Based Access Control (ABAC): A method that defines access permissions based on a diverse set of users and system attributes [3,9].
  • File Groups: A structure where a directory is created for a specific group of authorized users, and all files within that directory inherit the group’s access permissions.
Although ABAC provides superior fine-grained control, its inherent computational and storage overhead often exceeds the limited capabilities of mobile devices. To solve the problem, we proposed a scheme by integrating file groups with access right lists [10]. This hybrid approach offers enhanced efficiency while significantly reducing the computational and storage demands on the user.
Within the context of cloud storage services, the most fundamental approach to ensuring data confidentiality is to encrypt files locally prior to cloud transmission. However, this strategy becomes inefficient when files are shared across a diverse user base, particularly during the revocation of user access rights [5,11]. To address this, Hwang and Sun [10] proposed an optimized scheme that enables data owners to manage multi-user access. This mechanism allows each user to access all authorized files using a single key, while the data owner manages access control through a hierarchical shared-key tree and periodic key renewal messages.
Despite these improvements, the scheme relies heavily on symmetric encryption and decryption operations, resulting in substantial computational overhead for resource-constrained mobile devices. Furthermore, the following limitations persist [12]:
  • Storage Overhead for Data Owners: The data owner is required to maintain all keys within the hierarchical tree structure, leading to increased storage complexity.
  • Scalability of Key Renewal Costs: The computational cost associated with processing renewed key messages is significant for both data owners and users. Since the scheme employs symmetric encryption, the frequency of decryption operations increases linearly with the depth and complexity of the key tree, further straining device resources.
To address the aforementioned limitations, this paper proposes an enhanced, high-efficiency scheme tailored for mobile device users. In alignment with established security standards for cloud storage services [4], our proposed framework fulfills the following critical requirements:
  • Data Confidentiality: To prevent unauthorized access or data leakage from malicious cloud service providers and external attackers, an efficient encryption and decryption mechanism is essential to ensure the integrity and privacy of data stored in the cloud.
  • Access Control: The cloud infrastructure must rigorously validate all download requests to ensure that only users with verified access rights can retrieve specific data objects.
  • Efficient Authorization and Revocation: The data owner must be able to manage user registration and revocation seamlessly. Notably, the revocation process should be executed without necessitating updates or affecting the access privileges of the remaining authorized users.
  • Streamlined Key Management: Minimizing the administrative burden on the data owner is a primary objective. The data owner should be able to manage all files and authorized users with a minimal set of cryptographic keys. Furthermore, each authorized user should be able to access all permitted files using a single, unified secret key.
  • Lightweight Computation: To accommodate the limited resources of mobile platforms, the scheme must minimize the computational overhead for both data owners and users during all system operations.
Recent privacy-preserving cloud architectures increasingly employ layered protection mechanisms to mitigate unauthorized access, metadata leakage, and information exposure in semi-trusted distributed environments. In such architectures, over-encryption mechanisms are commonly adopted to provide additional confidentiality isolation between data owners, cloud service providers, and authorized users.
Unlike conventional single-layer encryption frameworks, privacy-preserving architectures often combine encryption, re-key management, access-control enforcement, and secure key-distribution mechanisms to reduce the risks associated with outsourced cloud storage and multi-user data sharing.
Motivated by these privacy-preserving design principles, the proposed scheme adopts a lightweight hierarchical over-encryption framework integrating sign-then-encrypt protection, hierarchical re-key derivation, and user-specific secret-key isolation. This design enables efficient access control and confidentiality preservation while maintaining low computational overhead for mobile and lightweight cloud environments.
The organization of the paper is as follows: In the next section, we give security assumptions, present the notation, and describe our scheme. In Section 3, the security analysis and performance evaluation are discussed. Section 4 presents our contributions, drawbacks, and conclusion of the presented scheme.

2. The Proposed Key Management Scheme

This section outlines the system assumptions and the notations employed in the proposed scheme. A comprehensive description of the operational phases and detailed steps is provided in Section 2.3.

2.1. System Assumptions

The design of the proposed scheme is predicated on the following assumptions and operational constraints:
  • Semi-trusted (Honest-but-Curious) Cloud Infrastructure: The Cloud Storage Service (CSS) provider is modeled as a semi-trusted (honest-but-curious) entity. Specifically, the CSS is assumed to correctly execute protocol operations, maintain storage availability, and enforce access-control procedures, while potentially attempting to infer sensitive information from stored ciphertexts, re-key materials, and access patterns [13].
    The proposed scheme therefore protects data confidentiality against curious cloud providers and unauthorized users without assuming full trust in the CSS infrastructure.
    We additionally consider a limited collusion scenario between the CSS and revoked users. In this setting, revoked users may cooperate with the CSS to obtain historical ciphertexts, stored re-key messages, or access-control metadata. However, after revocation, the Data Owner regenerates updated hierarchical path keys and renewed file encryption keys while excluding the revoked users’ secret keys from the newly generated re-key messages. Consequently, the system must ensure that unauthorized entities, including the CSS provider itself, cannot access the plaintext of files stored in the cloud. The revoked users cannot derive updated file encryption keys for future ciphertext versions even if the CSS shares previously stored cryptographic materials.
    It should be noted that the proposed scheme primarily targets semi-trusted cloud environments rather than fully malicious cloud infrastructures. Therefore, the current framework does not attempt to defend against adversarial CSS behaviors such as arbitrary protocol deviation, forged re-key material injection, unauthorized ciphertext modification, or deliberate access-control bypass attacks.
    Defending against fully malicious cloud providers would require additional mechanisms such as verifiable auditing, trusted execution environments, blockchain-assisted verification, or formally verified access-control protocols, which are beyond the scope of the present lightweight key-management design.
  • Service Availability and Connectivity: The CSS provider is required to maintain constant online availability. Conversely, data owners and authorized users are only expected to be online during active file operations or data retrieval [14].
  • System Scalability and Efficiency: The proposed tree-based architecture achieves maximum efficiency in scenarios where a high volume of users shares access to a relatively smaller set of files [10]. Under these conditions, the benefits of minimized key storage and management overhead are most pronounced.
  • Public Key Infrastructure (PKI): We assume the existence of a trusted Certificate Authority (CA) responsible for issuing and managing cryptographic key pairs. Each entity—including the data owner, CSS provider, and all users—possesses a valid public key pair, ensuring secure key distribution and identity verification across the system.
  • Adversary Model and Threat Assumptions: The proposed scheme considers the following adversarial entities and attack scenarios:
    (a)
    Honest-but-Curious CSS: The Cloud Storage Service (CSS) correctly executes storage and transmission protocols but may attempt to infer sensitive information from stored ciphertexts, access right lists, or re-key messages. However, the CSS does not possess users’ private keys or secret keys.
    (b)
    External Eavesdropper: An external attacker may intercept communication messages transmitted over public channels. The attacker is assumed to have full access to transmitted ciphertexts but cannot break standard asymmetric or symmetric cryptographic primitives.
    (c)
    Malicious User: An unauthorized or malicious user may attempt to access files beyond their granted privileges by exploiting intercepted re-key messages or previously obtained credentials.
    (d)
    Revoked User: A revoked user may retain previously issued secret keys and historical re-key messages and attempt to derive updated file encryption keys after revocation.
    (e)
    Collusion Attack: We additionally consider limited collusion scenarios between a revoked user and the honest-but-curious CSS. The adversary may combine previously stored re-key materials and encrypted files to recover updated file keys. However, since updated re-key messages are generated using renewed path keys and exclude the revoked user’s secret key, the colluding parties cannot derive valid updated encryption keys.
  • The proposed scheme assumes standard cryptographic hardness assumptions for hash functions, symmetric encryption, and public-key encryption mechanisms.

2.2. Cryptographic Primitives

The proposed scheme employs the Elliptic Curve Integrated Encryption Scheme (ECIES) for asymmetric encryption and the Elliptic Curve Digital Signature Algorithm (ECDSA) for message authentication and integrity verification. ECIES is adopted to provide confidentiality for transmitted messages, while ECDSA ensures authenticity and non-repudiation between communicating entities. Both cryptographic primitives are selected due to their lightweight computational characteristics and suitability for resource-constrained mobile cloud environments.
In this work, the term “over-encryption” refers to a layered protection mechanism combining digital signatures and public-key encryption. Specifically, the sender first signs the message to provide authenticity and integrity protection and subsequently encrypts the signed message using the recipient’s public key to ensure confidentiality over insecure communication channels.

2.3. Notation

The cryptographic notations and symbols employed throughout the proposed scheme are summarized in Table 1. The asymmetric key pair for any entity is denoted as ( P U X , P V X ) , where P U X and P V X represent the public and private keys, respectively. Specifically, these refer to the data owner ( P U O , P V O ), the cloud server ( P U C , P V C ), and the authorized user ( P U U , P V U ) within the system. To manage data security, the data owner maintains a master secret key, K O , which is utilized to derive individual file encryption keys, K F i . Similarly, each authorized user is assigned a personal secret key, K U , enabling the derivation of file encryption keys for which they have been granted access. Additionally, c F i denotes a cryptographic counter associated with each file. This counter is incremented by one upon each key update, serving as a versioning index for the generation of the most recent file encryption key.

2.4. The Proposed Scheme

The proposed scheme builds upon the framework introduced in [10], with the primary objective of mitigating computational overhead for both data owners and authorized users, while simultaneously reducing the storage requirements for data owners. The overall system architecture is illustrated in Figure 1, comprising three principal entities: the Data Owner (DO), the Cloud Storage Service (CSS) provider, and the authorized user.
  • Data Owner (DO): An entity, such as an enterprise or an individual, that maintains a large repository of data and seeks to share these resources with authorized parties.
  • Cloud Storage Service (CSS): A provider that facilitates data persistence, provides fundamental access control mechanisms, and ensures the security of stored files.
  • Authorized User: A participant who subscribes to or prepays for access to specific files owned by the DO and retrieves them through the CSS infrastructure.
During the initial configuration, the DO establishes a hierarchical tree structure to manage the access privileges of all users and encrypts each file independently prior to cloud transmission. Subsequently, authorized users obtain the necessary credentials from the DO to download and decrypt files from the CSS. The operational flow of the proposed protocol is categorized into three distinct phases: the setup phase, the registration phase, and the download phase.

2.4.1. Setup Phase

In the setup phase, the Data Owner (DO) prepares the files for secure cloud storage and defines the access control policies for potential users. The workflow of this phase is illustrated in Figure 2.
1.
Key Generation and Initialization: The DO compiles a file list ( F L ) containing the file identifier ( F I D ), file name, encryption key ( K F i ), and a renewal counter ( c F i ) for each data object. The DO then defines a master secret key K O and assigns a unique secret key K U to each user U. Each file encryption key K F i is derived using a one-way hash function: K F i = h ( K O F I D c F i ) .
2.
Hierarchical Access Tree Construction: The DO organizes access privileges using a shared-key tree structure, as depicted in Figure 3. The DO embeds the master key K O into all trees, while individual user keys K U are integrated into specific trees based on their granted access rights. For instance, if user U 1 is authorized only for file F 1 , they are assigned to the first tree. Conversely, user U 4 , with access to both F 1 and F 2 , is placed in the second tree. Although users within the same tree share identical access levels, their unique secret keys K U facilitate targeted key updates, ensuring that re-keying operations do not disrupt the access of non-revoked users.
3.
Re-key Message Generation: To enable key retrieval, the DO computes re-key messages using XOR operations and hash functions. Specifically, the DO generates R O = K t i h ( K O ) and R U i = K t i h ( K U i ) for the owner and user U i , respectively, allowing them to derive the internal tree key K t i . Subsequently, R t i = K r i h ( K t i ) and R r i = K F i h ( K r i ) are generated, providing authorized entities with the means to progressively decrypt and obtain the final file encryption key K F i .
4.
Data Outsourcing: Finally, the DO constructs an Access Right List ( A R L ) that maps user identifiers ( U I D ) to their authorized encrypted files, denoted as F I D i E K F i ( F i ) . The DO then transmits the A R L , the encrypted data objects, and the associated re-key messages to the CSS for storage.

2.4.2. Registration Phase

To access files owned by the DO, a new user must undergo the registration process to obtain the necessary authorization credentials. The workflow for this phase is depicted in Figure 4.
  • Access Request and Verification: The user initiates the registration request by first generating a digital signature:
    σ U = S i g n P V U ( U I D , { F I D } , T ) ,
    where U I D denotes a user identifier; { F I D } denotes a set of requested file identifiers; T denotes a timestamp used to prevent replay attacks.
    The user then encrypts the request message together with the signature using the Data Owner’s public key:
    E n c P U O ( U I D , { F I D } , T , σ U ) .
    Upon receiving the request, the Data Owner decrypts the ciphertext using its private key and verifies the authenticity of the request using the user’s public key P U U .
    After successful verification, the Data Owner generates a unique secret key K U for the user and computes the associated re-key message:
    R U = K t h ( K U ) .
    The Data Owner subsequently distributes the authorization credentials securely to the user and the CSS provider.
  • Credential Distribution: The DO securely distributes the credentials by transmitting E P U U ( E P V O ( U I D , K U , T ) ) to the user and E P U C ( E P V O ( F I D , R U ) ) to the CSS. This ensures that the user receives their private secret key while the CSS stores the re-key information necessary for file retrieval.

2.4.3. Download Phase

When an authorized user seeks to retrieve a file from the CSS, the download phase is initiated. The operational sequence for this phase is illustrated in Figure 5.
  • File Request and Verification: When an authorized user requests a file from the CSS, the user first generates a signed request message:
    σ U = S i g n P V U ( U I D , F I D , T ) ,
    and transmits:
    E n c P U C ( U I D , F I D , T , σ U ) .
    Upon receiving the request, the CSS validates the user’s access privileges by consulting the Access Right List ( A R L ). After verifying the user’s access privileges through the Access Right List (ARL), the CSS generates a digital signature:
    σ C = S i g n P V C ( E K K F ( F ) , R U , R t , R r ) ,
    and transmits the following encrypted response to the user:
    E n c P U U ( E K K F ( F ) , R U , R t , R r , σ C ) .
    The authorized user decrypts the message using the private key P V U and verifies the signature using the CSS public key P U C to ensure message authenticity and integrity. This response comprises the encrypted file alongside the corresponding re-key messages necessary for decryption.
  • Key Recovery and Decryption: Upon receipt, the user decrypts the outer layers of the message to retrieve the encrypted file and re-key parameters. Using their unique secret key K U , the user derives the file encryption key K F through a sequential cryptographic unwrapping process:
    K t = R U h ( K U ) ; K r = R t h ( K t ) ; K F = R r h ( K r ) .
    If the user possesses the correct authorization and secret key, the file encryption key K F is successfully recovered. Finally, the encrypted file is decrypted using:
    F = D K F ( E K K F ( F ) ) .

2.4.4. Revocation and Re-Key Procedure

When a user U r is revoked from the system, the Data Owner (DO) performs a localized re-key operation within the affected hierarchical shared-key tree. The revocation process only affects the cryptographic path from the revoked user’s leaf node to the corresponding tree root and associated file encryption keys.
Specifically, the DO regenerates the following cryptographic components:
  • The internal tree keys along the affected path: K t n e w ,
  • The corresponding root key of the affected file group: K r n e w .
  • The updated file encryption key for protected files: K F n e w = h ( K O F I D c F n e w ) , where the file counter is incremented as: c F n e w = c F + 1 . Subsequently, the DO generates updated re-key messages
    R U n e w = K t n e w h ( K U )
    R t n e w = K r n e w h ( K t n e w )
    R r n e w = K F n e w h ( K r n e w )
    for all non-revoked users within the affected group.
The revoked user’s secret key is excluded from the newly generated re-key messages. Therefore, even if the revoked user retains previously issued ciphertexts or historical re-key materials, the updated file encryption key cannot be derived.
The DO then securely transmits the updated re-key materials and newly encrypted file versions to the CSS. Remaining authorized users can derive the updated file encryption key using their existing personal secret key K U , without requiring redistribution of new personal credentials.
The following is the revocation procedure for User U r :
  • Input: Revoked user U r , affected file group G i
  • Step 1: Identify the hierarchical path from U r to the root node.
  • Step 2: Regenerate all internal keys on the affected path:
    K t n e w
  • Step 3: Regenerate the corresponding root key:
    K r n e w
  • Step 4: Increment file counter:
    c F c F + 1
  • Step 5: Generate updated file encryption key:
    K F n e w = h ( K O F I D c F )
  • Step 6: Generate updated re-key messages for remaining users:
    R U n e w , R t n e w , R r n e w
  • Step 7: Upload updated ciphertexts and re-key materials to CSS.
  • Output: Only non-revoked users can derive K F n e w .

3. Discussion and Analysis

Under the above adversary model, the proposed scheme satisfies the following security properties.

3.1. Security Analysis

Under the adversary model defined in Section 2.1, we evaluate whether the proposed scheme satisfies the required security properties for cloud storage services. Specifically, we consider honest-but-curious cloud servers, external eavesdroppers, malicious users, revoked users, and limited collusion attacks between revoked users and the CSS provider. In this section, we evaluate the proposed scheme against the security requirements established in Section 1. We demonstrate how our framework successfully satisfies the following five critical criteria for secure cloud storage services.
  • Data Confidentiality under Semi-trusted Cloud Assumptions. Under the defined adversary model, an external eavesdropper or an honest-but-curious CSS may intercept encrypted files, re-key messages, or communication traffic. However, all files are encrypted using symmetric encryption before being outsourced to the cloud. Moreover, the re-key messages are protected through one-way hash functions and XOR operations, ensuring that adversaries without the corresponding secret keys cannot derive valid file encryption keys.
  • Even if the CSS stores all ciphertexts and access-related information, it cannot recover the plaintext because it does not possess the users’ private keys or secret keys required for the hierarchical key derivation process.
  • Under the defined adversary model, the CSS may store all encrypted files, access-right mappings, and historical re-key materials. However, since the CSS does not possess the legitimate user secret keys required for hierarchical key derivation, it cannot independently recover valid file encryption keys.
  • Moreover, after user revocation, newly generated re-key materials exclude revoked users from the updated hierarchical key path. Therefore, even if the CSS colludes with revoked users, future file encryption keys remain computationally infeasible to derive under the assumed cryptographic primitives.
  • Recent studies have further highlighted that privacy leakage in distributed and intelligent computing systems may arise not only from direct ciphertext exposure but also from model updates, shared outputs, metadata analysis, and indirect inference attacks [15]. In particular, cloud-assisted artificial intelligence environments introduce additional risks related to information leakage during data sharing, access synchronization, and update propagation.
  • The proposed scheme mitigates these risks by enforcing hierarchical access control, lightweight re-key isolation, and user-specific key derivation mechanisms. Even if encrypted files and historical re-key materials are exposed through cloud storage infrastructures, unauthorized entities remain unable to derive valid file encryption keys without possessing the corresponding secret credentials.
  • Access Control. The CSS provider enforces access control by verifying the user’s identity against the Access Right List (ARL). Upon successful authorization, the CSS encapsulates the encrypted file and relevant re-key messages within a layer of asymmetric encryption using the recipient’s public key. Since decryption requires the corresponding private key, only the intended authorized user can access the contents. Consequently, unauthorized entities are strictly prohibited from obtaining both the encrypted data and the necessary re-key parameters.
  • The proposed scheme prevents malicious or unauthorized users from accessing files beyond their granted privileges. Before delivering encrypted files, the CSS verifies the requester against the Access Right List (ARL). Furthermore, the encrypted file and corresponding re-key messages are additionally protected using the recipient’s public key.
  • Therefore, even if an attacker intercepts the transmitted messages, successful decryption still requires possession of the legitimate private key and the corresponding secret key K U . Unauthorized users cannot derive the correct hierarchical keys needed to recover the file encryption key K F .
  • Efficient Authorization and Revocation. The Data Owner (DO) facilitates fine-grained authorization by assigning a unique secret key to each user. By utilizing the re-key message R U , users can leverage their individual secret key K U to retrieve the file encryption key. In the event of user revocation, the DO simply updates the cryptographic path from the revoked user’s leaf node to the root, renewing K t , K r , K F and the associated re-key messages ( R r , R t , R U ). By excluding the revoked user’s secret key from the newly generated R U , revocation is achieved efficiently without necessitating updates for the remaining authorized users.
  • The proposed scheme provides resistance against revoked-user attacks under the defined adversary model. When a user is revoked, the Data Owner updates the cryptographic path from the revoked leaf node to the root by renewing K t , K r , K F , and the associated re-key messages. Because the newly generated re-key message R U no longer includes the revoked user’s secret key, previously revoked users cannot derive updated file encryption keys even if they retain historical re-key messages or previously downloaded ciphertexts. In addition, non-revoked users remain unaffected during the revocation process, thereby significantly reducing the communication and computational overhead associated with re-key distribution.
  • The proposed revocation mechanism provides forward secrecy for future file versions. After revocation, newly updated ciphertexts are protected using refreshed file encryption keys derived from updated counters and renewed hierarchical path keys. Consequently, revoked users cannot access subsequently updated files.
  • However, if revoked users have previously downloaded ciphertexts encrypted under older file keys, those historical ciphertexts may remain accessible. Therefore, the proposed scheme focuses on efficient forward secrecy rather than retroactive backward secrecy for previously obtained data.
  • Key Management. The proposed scheme utilizes a hierarchical shared-key tree structure [16] to enable dynamic file encryption key updates while maintaining system stability. By embedding the DO’s master key K O into each shared-key tree, the proposed scheme reduces the need for the Data Owner (DO) to explicitly store all internal tree keys and root keys within the hierarchy. Instead, the DO can dynamically derive the required cryptographic keys when necessary. Both the DO and authorized users are required to store only a single secret key. From this single key, the DO can derive all necessary file encryption keys and tree nodes, significantly streamlining key management.
  • Resistance to Limited Collusion Attacks. We additionally consider a limited collusion scenario between an honest-but-curious CSS and revoked users. Although the CSS may store encrypted files and historical re-key messages, the colluding parties still cannot derive valid updated file encryption keys because the renewed re-key messages are generated using updated path keys that exclude the revoked user’s secret key.
  • Consequently, access to future encrypted files remains protected even if previously exposed ciphertexts and outdated re-key materials are shared among colluding adversaries.
  • It should be noted that the storage complexity discussed in this work distinguishes between cryptographic key storage and system metadata storage. Specifically:
    • The File List (FL) stores file identifiers, counters, and associated metadata, resulting in a storage complexity proportional to the number of files: O ( n ) .
    • The Access Right List (ARL) maintains user authorization relationships, whose storage complexity depends on the number of authorized users and access mappings: O ( s ) . or higher in practical deployments.
    • The primary optimization achieved by the proposed scheme concerns hierarchical key material storage. Traditional hierarchical key management approaches often require explicit storage of internal tree keys and root keys for all groups. In contrast, the proposed scheme only requires the DO to maintain the master secret key: K O from which hierarchical keys can be dynamically derived.
  • Lightweight Computation. To optimize performance for mobile environments, our scheme replaces the intensive symmetric encryption operations used in [10] with efficient XOR operations and one-way hash functions for re-key message generation. This substitution significantly reduces the computational overhead required for users to retrieve file encryption keys, fulfilling the requirement for a lightweight security protocol suitable for resource-constrained devices.
  • Recent studies on predictive healthcare security frameworks have demonstrated that advanced encryption, decryption, and intelligent prediction mechanisms may introduce considerable computational overhead in resource-constrained environments [17]. For example, predictive protection frameworks utilizing BObMNN-based security analysis require repeated encryption/decryption operations and continuous model-processing procedures for healthcare data protection.
  • Compared with such predictive security frameworks, the proposed scheme primarily relies on lightweight XOR operations and SHA-256 hash computations for hierarchical re-key generation and file-key derivation. Consequently, the computational burden imposed on mobile devices and lightweight cloud users is significantly reduced while still maintaining practical access-control and confidentiality protections.
The present work focuses on lightweight practical security for mobile cloud environments and therefore emphasizes adversary-based security reasoning and operational efficiency rather than formal game-based cryptographic proofs. A fully provable security framework will be considered as future work.

3.2. Performance Evaluation

The proposed scheme extends the framework of Hwang and Sun [10] with the primary goal of optimizing computational overhead for both data owners (DO) and users. Table 2 provides a comprehensive comparison between the proposed scheme and the baseline approaches [18,19,20].
The computational complexity of the proposed phases is summarized as follows:
  • Setup Phase: The DO performs n hash operations to generate file encryption keys, n symmetric encryptions for file protection, and ( 1 + s + k + m ) hash and XOR operations to produce re-key messages ( R O , { R U i } , { R r i } , { R t i } ). Additionally, two asymmetric encryptions are applied to secure the A R L and associated messages, while the CSS requires two asymmetric decryptions for data ingestion.
  • Registration Phase: The user performs two asymmetric encryptions to secure the request ( U I D , { F I D } , and T). The DO subsequently performs two asymmetric decryptions, followed by a hash and an XOR operation. To complete the process, the DO executes four asymmetric encryptions to distribute credentials, which the user and CSS then decrypt using two asymmetric decryptions each.
  • Download Phase: The user initiates the request with two asymmetric encryptions. The CSS performs two asymmetric decryptions for verification, followed by two asymmetric encryptions to deliver the encrypted file and re-key messages. Finally, the user employs two asymmetric decryptions, three hash and XOR operations to derive the file encryption key, and one symmetric decryption to access the file content.
To further substantiate the practical advantages of the proposed scheme, it is essential to move beyond a qualitative functional overview and perform a rigorous quantitative analysis. While existing frameworks from 2025 introduce advanced features such as Zero-Trust architectures and cloud-edge collaboration, they often rely on heavy cryptographic primitives that may not be sustainable for all environments. To provide a clearer perspective on the operational efficiency of our approach, we evaluate several key performance metrics—including computational latency, storage complexity, and energy consumption—against these state-of-the-art schemes. By benchmarking standard cryptographic operations on ARM-based mobile architectures, we establish a performance baseline that highlights the suitability of each method for resource-constrained devices. The detailed quantitative comparison is summarized in Table 3.
The quantitative values shown in Table 3 are intended to provide a comparative estimation of the computational characteristics of different cryptographic primitives rather than direct end-to-end implementation benchmarks of the proposed protocol. The ranges are derived from representative computational costs widely discussed in prior literature concerning SHA-256 hashing, XOR operations, bilinear pairing, modular exponentiation, and CP-ABE-related cryptographic operations [21].
In the proposed scheme, lightweight operations primarily consist of SHA-256 hash computations and XOR operations, whereas the compared schemes rely heavily on bilinear pairings and modular exponentiation, which are significantly more computationally intensive on resource-constrained mobile devices.
Based on the comprehensive comparison in Table 3, the proposed scheme demonstrates significant superiority over state-of-the-art literature from 2025, particularly in its suitability for resource-constrained mobile environments. In summary, the proposed scheme offers four distinct advantages:
  • Optimal Hierarchical Key Storage Efficiency: Unlike recent schemes such as Du et al. [18] and Tian [19], which require the Data Owner (DO) to maintain complex role-tag lists or attribute sets, our scheme significantly reduces storage overhead. By utilizing a hierarchical tree structure where only F L , A R L , and K O are required, we achieve a constant or logarithmic storage complexity with respect to hierarchical cryptographic key materials ( O ( 1 ) or O ( log n ) ), Metadata Storage (FL/ARL): O ( n ) and O ( s ) , eliminating the need for DOs to store large quantities of internal hierarchical or root keys. Therefore, the proposed scheme does not eliminate the inherent metadata storage requirements associated with maintaining file and authorization information. Instead, the optimization focuses on reducing the storage burden of hierarchical cryptographic key materials, particularly internal tree keys and root keys, which commonly dominate traditional hierarchical key management systems.
  • High-Performance Computational Optimization: While the 2025 frameworks (Tian [19] and Zheng et al. [20]) rely on computationally intensive Bilinear Pairing ( T p ) and Modular Exponentiation ( T e ) operations, our scheme substitutes these with efficient Hash and XOR operations ( T X O R , h ). As Hash operations are approximately three orders of magnitude faster than Pairings, our scheme achieves nearly instantaneous processing times (<1 ms), whereas ABE-based counterparts often exceed 200 ms.
  • Streamlined Key Management and Revocation: The proposed scheme offers a low-complexity revocation mechanism. Revocation only requires a targeted path update in the hierarchical tree, ensuring that non-revoked users remain unaffected. In contrast, Attribute-Based Encryption (ABAC/CP-ABE) schemes often suffer from high revocation costs due to the necessity of re-keying large sets of attributes across the entire system.
  • Minimal Client-Side Burden: By enabling users to maintain only a single secret key ( K U ), our scheme avoids the “key explosion” problem seen in attribute-based or role-based schemes where key length scales linearly with attributes or roles. This lightweight footprint makes our approach the most viable solution for battery-sensitive mobile devices, edge-assisted IoT systems, and moderately resource-constrained environments.
The quantitative metrics presented in Table 3 provide a comprehensive evaluation of the proposed scheme compared to state-of-the-art literature from 2025. The data highlights a significant performance gap, particularly in terms of operational efficiency and resource management for mobile environments:
  • Computational Latency: The results indicate that the user-side computation cost of the proposed scheme remains under 1 ms, which is significantly lower than the 50 500 ms required by the schemes of Du et al. [18], Tian [19], and Zheng [20]. This drastic reduction is achieved by substituting expensive Bilinear Pairing operations, prevalent in 2025 frameworks, with high-speed SHA-256 hashing and XOR logic. On ARM-based mobile processors, this transition not only saves hundreds of clock cycles but also prevents processor throttling and overheating during frequent access requests.
  • Storage and Complexity Scaling: By integrating the Data Owner’s (DO) master key directly into the hierarchical tree structure, the proposed scheme successfully limits storage overhead to a constant or logarithmic scale ( O ( 1 ) or O ( log n ) ). In contrast, the methods proposed by Du et al. [18] and Tian [19] face linear growth challenges due to data tags and attribute sets, respectively. Our approach demonstrates superior scalability as the volume of files and users increases within the cloud ecosystem.
  • Mobile Suitability and Energy Efficiency: The energy consumption data reveals a direct correlation between cryptographic primitive selection and battery impact. The proposed scheme requires users to manage only a 256-bit single key, drastically reducing local memory footprints compared to the > 2048 -bit attribute keys required by CP-ABE-based schemes. Furthermore, the revocation traffic is minimized to O ( log n ) , ensuring that authority updates remain rapid and reliable even under low-bandwidth mobile network conditions.
The quantitative results in Table 3 substantiate that the proposed lightweight mechanism not only maintains security standards comparable to current mainstream literature but also holds a decisive technical advantage in meeting the practical “low-energy, high-responsiveness” requirements of modern mobile devices.

3.3. Communication Overhead and Revocation Traffic

In addition to computational efficiency, communication overhead is also an important consideration in low-bandwidth IoT environments. During the revocation process, the proposed scheme requires the Data Owner (DO) to distribute updated re-key materials along the affected hierarchical path.
The revocation communication complexity is proportional to: O ( log n ) where n denotes the number of users or tree nodes within the hierarchical structure.
Unlike CP-ABE-based revocation mechanisms, which often require retransmission of large attribute-update components or complete ciphertext re-encryption, the proposed scheme only distributes lightweight XOR/hash-based re-key materials, including: R U , R t , R r . Each re-key message primarily contains hash-derived key materials with sizes comparable to standard cryptographic hash outputs (e.g., SHA-256 outputs of 256 bits). Consequently, the communication overhead introduced during revocation remains relatively small compared to pairing-based revocation approaches.
For example, assuming SHA-256-based re-key components of 256 bits, a single revocation update involving three re-key parameters requires approximately:
3 × 256 = 768   bits
excluding protocol headers and transmission metadata.
Even for hierarchical trees with multiple affected levels, the resulting communication overhead remains substantially lower than CP-ABE-based schemes requiring large attribute-update structures or pairing-related ciphertext updates.
Nevertheless, although the proposed revocation mechanism significantly reduces computational overhead, communication overhead may still become non-negligible in ultra-low-bandwidth IoT sensing environments with highly constrained transmission capacity, intermittent connectivity, or energy-harvesting limitations.
Therefore, the proposed scheme is more suitable for lightweight mobile devices, edge-assisted IoT systems, and moderately resource-constrained environments rather than extremely bandwidth-limited sensing nodes.

4. Conclusions

This paper presents a refined hierarchical key management scheme designed to minimize the storage and computational overhead for data owners and users within cloud storage environments. By integrating the data owner’s secret key directly into the hierarchical shared-key tree, the proposed scheme eliminates the necessity for the owner to locally store internal tree keys ( K t ) and root keys ( K r ) for each file group. Furthermore, we significantly optimized the generation and processing of re-key messages. Given that the computational cost of a single symmetric encryption operation is approximately equivalent to 100 hash operations, our substitution of symmetric encryption with lightweight hash and Exclusive-OR (XOR) operations provides a substantially more efficient and responsive user experience.
Although the proposed scheme provides practical resistance against multiple common attack scenarios in cloud storage services, this work does not aim to establish a formal provable-security framework under standard cryptographic models. Instead, the primary focus is on lightweight computation, efficient key management, and practical deployability for mobile cloud environments. Formal security proofs and stronger collusion-resistant constructions will be considered in future work.
Although the proposed scheme significantly reduces computational overhead through lightweight XOR/hash-based re-key operations, the practical applicability of the framework may still be constrained in ultra-low-power IoT sensing environments with extremely limited bandwidth, memory capacity, intermittent connectivity, or energy-harvesting limitations. Therefore, the proposed framework is more suitable for mobile cloud systems, edge-assisted IoT architectures, and moderately constrained devices rather than highly restricted sensing nodes operating under severe communication and energy constraints.
In summary, the proposed scheme introduces a high-performance key management methodology that prioritizes resource efficiency. Under this framework, users are required to maintain only a single cryptographic key and perform a minimal number of hash and XOR operations to derive authorized re-key messages. This approach drastically reduces complexity compared to traditional methods involving multiple symmetric operations or modular exponentiations. Moreover, the lightweight re-keying mechanism streamlines the user revocation process; the data owner can revoke access without necessitating the regeneration of secret keys or the redistribution of authorization credentials to the remaining users, thereby significantly mitigating communication overhead.

Author Contributions

N.-I.W. proposed the idea and reviewed the methodology and manuscript. T.-H.S. wrote this paper and discussed the methodology; C.-Y.Y. discussed and reviewed the methodology and manuscript; M.-S.H. discussed, supervised, and reviewed the methodology and manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

The National Science and Technology Council, Taiwan, partially supported this research under contract no.: NSTC 114-2221-E-468-007.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Li, F. Collaborative Network Security Protection System Design in Cloud Computing Environment. Int. J. Netw. Secur. 2025, 27, 556–565. [Google Scholar]
  2. Tang, J.; Zhang, Q.; Zhang, S. Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing. Int. J. Netw. Secur. 2026, 28, 54–67. [Google Scholar]
  3. Lee, S.-H.; Oh, S.-H.; Kim, J.-G. YOLOv5-Based Electric Scooter Crackdown Platform. Appl. Sci. 2025, 15, 3112. [Google Scholar] [CrossRef]
  4. Deng, Z.; Li, K.; Li, K.; Zhou, J. A multi-user searchable encryption scheme with keyword authorization in a cloud storage. Future Gener. Comput. Syst. 2017, 72, 208–218. [Google Scholar] [CrossRef]
  5. Qin, L.; Liu, S.; Liu, X.; Yu, J. An Attribute-based Encryption with Silent Revocation for Cloud Storage. Int. J. Netw. Secur. 2026, 28, 834–839. [Google Scholar]
  6. Yuan, Y.; Gu, Y.; Zhang, Z. Public Data Integrity Auditing Scheme Based on Fuzzy Identity for Cloud Storage System. Int. J. Netw. Secur. 2023, 25, 609–619. [Google Scholar]
  7. Ahuja, R.; Mohanty, S.K.; Sakurai, K. A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing. Comput. Electr. Eng. 2017, 57, 241–256. [Google Scholar] [CrossRef]
  8. di Vimercati, S.D.C.; Foresti, S.; Jajodia, S.; Paraboschi, S.; Samarati, P. Over-encryption: Management of access control evolution on outsourced data. In Proceedings of the 33th VLDB International Conference, Vienna, Austria, 23–27 September 2007; pp. 123–134. [Google Scholar]
  9. Sun, W.; Lu, J.; Wang, M. Policy Extraction and Optimization with Top-down and Bottom-up Approaches for Attribute-based Access Control. Int. J. Netw. Secur. 2024, 26, 535–545. [Google Scholar]
  10. Sun, T.-H.; Hwang, M.-S. A hierarchical data access and key management in cloud computing. ICIC Express Lett. 2012, 6, 569–574. [Google Scholar]
  11. Li, S.; She, K.; Li, R. CP-ABE Scheme Supporting Direct Revocation and Outsourcing Decryption. Int. J. Netw. Secur. 2026, 28, 474–486. [Google Scholar]
  12. Hwang, M.-I.; Lee, C.-H.; Sun, T.-S.; Yang, C.-H. Cryptanalysis of A hierarchical Data Access and Key Management in Cloud Computing. In Proceedings of the 5th Annual International Conference on Information Technology and Applications (ITA 2018), Guilin, China, 19–21 October 2018. [Google Scholar]
  13. Wang, C.; Wang, Q.; Ren, K.; Cao, N.; Lou, W. Towards secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 2011, 22, 847–859. [Google Scholar] [CrossRef]
  14. Sanka, S.; Hota, C.; Rajarajan, M. Secure data access in cloud computing. In Proceedings of the 4th IMSAA International Conference, Bangalore, India, 15–17 December 2010; pp. 1–6. [Google Scholar]
  15. Tumma, C.; Azmeera, R.; Ayyamgari, S.; Thumma, B.Y.R. Data Security and Privacy Protection in Artificial Intelligence Models: Challenges and Defense Mechanisms. Int. J. Sci. Res. Eng. Manag. 2023, 7, 1–9. [Google Scholar] [CrossRef]
  16. Gu, Q.; Liu, P.; Lee, W.; Chu, C.-H. Ktr: An efficient key management scheme for secure data access control in wireless broadcast services. IEEE Trans. Dependable Secur. Comput. 2009, 6, 188–201. [Google Scholar] [CrossRef]
  17. Konda, B.; Yadulla, A.R.; Kasula, V.K.; Yenugula, M.; Ayyamgari, S. A Secure Predictive Framework for Preventing Health Care Data. Stat. Optim. Inf. Comput. 2025, 15, 571–585. [Google Scholar] [CrossRef]
  18. Du, R.; Wang, Z.; Wan, Y. A Multi-Level Role-Based Provable Data Possession Scheme for Medical Cloud Storage. Concurr. Comput. Pr. Expert 2025, 37, e70120. [Google Scholar] [CrossRef]
  19. Tian, J. Zero trust anonymous access algorithm for multi cloud storage system based on CP-ABE. Egypt. Inform. J. 2025, 30, 100681. [Google Scholar] [CrossRef]
  20. Zheng, K.; Zhou, J.; Zhou, D.; Xu, Z.; Liu, J.; Bai, C.; Li, L.; Wang, J.; Zhang, X. An Attribute-Revocable Hierarchical Access Control Scheme for Data Sharing in Cloud-Edge-End Environments. In Proceedings of the 2025 International Conference on Metaverse Computing, Networking and Applications (MetaCom), Seoul, Republic of Korea, 25–29 August 2025; pp. 143–148. [Google Scholar] [CrossRef]
  21. Chhatrapati, A.; Hohenberger, S.; Trombo, J.; Vusirikala, S. A Performance Evaluation of Pairing-Based Broadcast Encryption Systems. Cryptology ePrint Archive, Paper 2021/1526, 2021. Available online: https://eprint.iacr.org/2021/1526 (accessed on 14 May 2026).
Figure 1. System architecture of the proposed scheme.
Figure 1. System architecture of the proposed scheme.
Electronics 15 02185 g001
Figure 2. Workflow of the setup phase.
Figure 2. Workflow of the setup phase.
Electronics 15 02185 g002
Figure 3. The hierarchical shared-key tree representing user access rights.
Figure 3. The hierarchical shared-key tree representing user access rights.
Electronics 15 02185 g003
Figure 4. Workflow of the registration phase.
Figure 4. Workflow of the registration phase.
Electronics 15 02185 g004
Figure 5. Workflow of the download phase.
Figure 5. Workflow of the download phase.
Electronics 15 02185 g005
Table 1. Notation table.
Table 1. Notation table.
NotationSignificance
P U X Public key of person X.
P V X Private key of person X.
K O Data Owner’s secret key.
K U User’s secret key.
A R L Access Right List of all authorized users.
F L File list.
U I D User’s ID.
nThe number of files the data owner has.
sThe number of authorized users.
kThe number of file groups.
mThe number of internal key of file group.
F I D i File ID, i = 1 , . . . , n .
c F i The re-key counter of F i .
K F i File encryption key of file i, i = 1 , . . . , n .
K r i Root key of the file group i, i = 1 , . . . , k .
K t i Internal key of the file group i, i = 1 , . . . , m .
E K Asymmetric encryption function.
D K Asymmetric decryption function.
h ( · ) A one-way hash function.
An exclusive or operator.
TSystem time stamp.
S i g n P V X ( M ) Digital signature on message M using the private key of entity X.
V e r i f y P U X ( M , σ ) Signature verification using the public key of entity X.
E n c P U X ( M ) Public-key encryption using the public key of entity X.
D e c P V X ( C ) Public-key decryption using the private key of entity X.
σ Digital signature value.
Table 2. Comparison of key management, storage, and computing cost with others.
Table 2. Comparison of key management, storage, and computing cost with others.
Our SchemeDu et al. [18]Tian [19]Zheng et al. [20]
CoreHierarchical TreeRBACZero TrustCloud-Edge-End
Mechanism+ XOR/Hash+ PDP (Medical)+ CP-ABE+ ABAC
Storage Cost
DO (Owner) F L , A R L , K O Roles, Policies, Tag List M K , P K , Attributes M S K , P K , Revocation List
User K U (Single Key)Role Keys S K a t t r (Attribute-based) S K a t t r + S K e d g e
CSS (Cloud) A R L , { E K K F i } , { R x } E n c D a t a , Proof Tags E n c D a t a , Access Tree E n c D a t a , Re-keys
Key Management
Revocation ComplexityLow (Path update only)High (Role reassignment)High (Attribute re-keying)Medium (Edge assisted)
Revoke AffectedNone (Targeted)Other users in same roleUsers with same attributesUsers in specific end-nodes
Computing Cost
DO (Owner) n T E K S + 8 T A S + O ( m ) T X O R , h T P D P + T S i g n + T E n c T S e t u p + O ( A ) T e T G e n + O ( A ) T p
User 8 T A S + T D K S + 3 T X O R , h T V e r i f y + T D e c T D e c + O ( A ) ( T p + T e ) T D e c + O ( D ) T p
CSS (Cloud) 8 T A S T C h a l l e n g e + T V e r i f y T M a t c h T T r a n s + T V e r i f y
Main AdvantageLightweight (No Pairing)Data Integrity (PDP)Anonymity & Zero TrustEdge Computing Efficiency
Notations for Computational Cost: T A S : Time for Asymmetric Encryption/Decryption. T E K S / T D K S : Time for Symmetric Encryption/Decryption. T X O R , h : Time for XOR or Hash operation (Minimal). T p : Time for Bilinear Pairing operation (High). T e : Time for Modular Exponentiation. T P D P : Time for Provable Data Possession verification. O ( A ) : Complexity scales with the number of attributes. O ( D ) : Complexity scales with the tree depth.
Table 3. Comparison with a rigorous quantitative analysis.
Table 3. Comparison with a rigorous quantitative analysis.
Feature/ReferenceProposed SchemeDu et al. [18]Tian [19]Zheng et al. [20]
SecurityHierarchical TreeMulti-level Role (RBAC)Zero TrustCloud-Edge-End
Architecture+ XOR/Hash+ PDP Proof+ CP-ABE+ ABAC
Core Operation TypeSHA-256 Hash / XORBilinear Pairing + ECCPairing + MapToPointPairing + Attribute Update
User Computation CostTypically < 1 ms 50 150 ms 200 500 ms (Scales with A) 80 200 ms (Edge-assisted)
DO Storage Cost O ( 1 ) or O ( log n ) O ( n ) (Scales with data blocks) O ( A ) (Scales with attributes) O ( D ) (Scales with tree depth)
User Key Length256 bits (Single Key) 1024 2048 bits > 2048 bits (Linear with A) > 1024 bits (Scales with depth)
Revocation Traffic O ( log n ) XOR messages O ( Role ) re-assignment O ( A ) attribute updates O ( D ) edge synchronization
Energy ConsumptionNegligibleModerate (Frequent pairing)High (Significant battery impact)Moderate (Edge-offloaded)
Mobile SuitabilityHigh (Resource-constrained)Moderate (Medical terminals)Low (Computation-intensive)Moderate (Edge-dependent)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, N.-I.; Sun, T.-H.; Yang, C.-Y.; Hwang, M.-S. A Hierarchical Key Management Scheme for Efficient Outsourced Computation in Cloud Storage Services. Electronics 2026, 15, 2185. https://doi.org/10.3390/electronics15102185

AMA Style

Wu N-I, Sun T-H, Yang C-Y, Hwang M-S. A Hierarchical Key Management Scheme for Efficient Outsourced Computation in Cloud Storage Services. Electronics. 2026; 15(10):2185. https://doi.org/10.3390/electronics15102185

Chicago/Turabian Style

Wu, Nan-I, Tsuei-Hung Sun, Cheng-Ying Yang, and Min-Shiang Hwang. 2026. "A Hierarchical Key Management Scheme for Efficient Outsourced Computation in Cloud Storage Services" Electronics 15, no. 10: 2185. https://doi.org/10.3390/electronics15102185

APA Style

Wu, N.-I., Sun, T.-H., Yang, C.-Y., & Hwang, M.-S. (2026). A Hierarchical Key Management Scheme for Efficient Outsourced Computation in Cloud Storage Services. Electronics, 15(10), 2185. https://doi.org/10.3390/electronics15102185

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop