Javascript must be enabled to continue!
Research on Ciphertext‐Policy Attribute‐Based Encryption with Attribute Level User Revocation in Cloud Storage
View through CrossRef
Attribute‐based encryption (ABE) scheme is more and more widely used in the cloud storage, which can achieve fine‐grained access control. However, it is an important challenge to solve dynamic user and attribute revocation in the original scheme. In order to solve this problem, this paper proposes a ciphertext‐policy ABE (CP‐ABE) scheme which can achieve attribute level user attribution. In this scheme, if some attribute is revoked, then the ciphertext corresponding to this attribute will be updated so that only the individuals whose attributes meet the access control policy and have not been revoked will be able to carry out the key updating and decrypt the ciphertext successfully. This scheme is proved selective‐structure secure based on theq‐Parallel Bilinear Diffie‐Hellman Exponent (BDHE) assumption in the standard model. Finally, the performance analysis and experimental verification have been carried out in this paper, and the experimental results show that, compared with the existing revocation schemes, although our scheme increases the computational load of storage service provider (CSP) in order to achieve the attribute revocation, it does not need the participation of attribute authority (AA), which reduces the computational load of AA. Moreover, the user does not need any additional parameters to achieve the attribute revocation except for the private key, thus saving the storage space greatly.
Title: Research on Ciphertext‐Policy Attribute‐Based Encryption with Attribute Level User Revocation in Cloud Storage
Description:
Attribute‐based encryption (ABE) scheme is more and more widely used in the cloud storage, which can achieve fine‐grained access control.
However, it is an important challenge to solve dynamic user and attribute revocation in the original scheme.
In order to solve this problem, this paper proposes a ciphertext‐policy ABE (CP‐ABE) scheme which can achieve attribute level user attribution.
In this scheme, if some attribute is revoked, then the ciphertext corresponding to this attribute will be updated so that only the individuals whose attributes meet the access control policy and have not been revoked will be able to carry out the key updating and decrypt the ciphertext successfully.
This scheme is proved selective‐structure secure based on theq‐Parallel Bilinear Diffie‐Hellman Exponent (BDHE) assumption in the standard model.
Finally, the performance analysis and experimental verification have been carried out in this paper, and the experimental results show that, compared with the existing revocation schemes, although our scheme increases the computational load of storage service provider (CSP) in order to achieve the attribute revocation, it does not need the participation of attribute authority (AA), which reduces the computational load of AA.
Moreover, the user does not need any additional parameters to achieve the attribute revocation except for the private key, thus saving the storage space greatly.
Related Results
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...
An efficient scheme to support direct revocation in cloud computing using CPABE: The approach with less time constraints
An efficient scheme to support direct revocation in cloud computing using CPABE: The approach with less time constraints
Secure Data sharing is a major issue of concern in cloud computing. CPABE is well known encryption technique for dealing with the problem of data security over network. Most of the...
Securing E-health Data using Ciphertext-Policy Attribute-Based Encryption with Dynamic User Revocation
Securing E-health Data using Ciphertext-Policy Attribute-Based Encryption with Dynamic User Revocation
E-health systems hold a massive amount of medical data that is stored and shared across healthcare service providers to deliver health facilities. However, security and privacy wor...
Current Issues in Ciphertext Policy-Attribute Based Scheme for Cloud Computing: A Survey
Current Issues in Ciphertext Policy-Attribute Based Scheme for Cloud Computing: A Survey
The use of cloud computing has increased exponentially in data resources storage over the past few years. Cloud storage reduces the overall costs of server maintenance, whereby com...
Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key
Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key
As a method for providing security of the messages sent via a public channel in the case of potential coercive attacks there had been proposed algorithms and protocols of deniable ...
Définition et conception d'un système optimal de la révocation de certificats
Définition et conception d'un système optimal de la révocation de certificats
La Public Key Infrastructure(PKI) est une infrastructure à clés publique dont l’objectif est de répondre à des besoins tel que : l’authentification de clés publiques, le contrôle d...

