Blockchain-Based Traceable Multi-Level Revocation Attribute-Based Encryption

被引:0
|
作者
Xu, Zhigang [1 ]
Pan, Tiantian [1 ]
Han, Hongmu [1 ]
Dong, Xinhua [1 ]
Wang, Zhongpeng [1 ]
He, Miaomiao [1 ]
机构
[1] Hubei Univ Technol, Sch Comp Sci, Wuhan 430068, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Encryption; Blockchains; Cloud computing; Cryptography; Access control; Smart contracts; Servers; Real-time systems; Protection; Data security; Attribute-based encryption (ABE); attribute revocation; blockchain; data security; SCHEME; STORAGE;
D O I
10.1109/ACCESS.2024.3493464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing and big data, data security and privacy protection in multi-user environments have become particularly important. Existing encryption schemes exhibit significant deficiencies in addressing the flexible revocation of user attributes and dynamic changes in access permissions, leading to unauthorized users illicitly accessing and tampering with data. Therefore, we propose a Blockchain-based Traceable Multi-Level Revocable Attribute-Based Encryption Scheme (BTMAR-ABE). This scheme combines the advantages of Attribute-Based Encryption (ABE) technology and blockchain, achieving real-time attribute updates and verification through smart contracts, thereby avoiding reliance on a single centralized management server and introducing uniquely associated random numbers to prevent collusion attacks. To achieve flexible and secure data access control, we designed a multi-level revocation mechanism for both temporary and permanent revocation to address short-term and long-term permission change requirements. Performance evaluation and security analysis indicate that the BTMAR-ABE scheme can effectively resist chosen plaintext attacks, attribute revocation attacks, and collusion attacks, while demonstrating significant efficiency advantages in computational cost. Simulation results further demonstrate that this scheme has high practical value in data security and access control.
引用
收藏
页码:173758 / 173774
页数:17
相关论文
共 50 条
  • [21] Efficient attribute-based encryption with attribute revocation for assured data deletion
    Xue, Liang
    Yu, Yong
    Li, Yannan
    Au, Man Ho
    Du, Xiaojiang
    Yang, Bo
    INFORMATION SCIENCES, 2019, 479 : 640 - 650
  • [22] Generic attribute revocation systems for attribute-based encryption in cloud storage
    Chen, Genlang
    Xu, Zhiqian
    Zhang, Jia-jian
    Wang, Guo-jun
    Jiang, Hai
    Huang, Miao-qing
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (06) : 773 - 786
  • [23] Multi-Authorization Attribute-Based Verifiable Encryption Scheme Based on Blockchain
    Feng, Tao
    Kong, Fanqi
    Liu, Chunyan
    Lu, Ye
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (05): : 1617 - 1624
  • [24] Attribute-based encryption with outsourced decryption in blockchain
    Hui Zheng
    Jun Shao
    Guiyi Wei
    Peer-to-Peer Networking and Applications, 2020, 13 : 1643 - 1655
  • [25] Searchable attribute-based encryption scheme with attribute revocation in cloud storage
    Wang, Shangping
    Zhao, Duqiao
    Zhang, Yaling
    PLOS ONE, 2017, 12 (08):
  • [26] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [27] Generic attribute revocation systems for attribute-based encryption in cloud storage
    Genlang Chen
    Zhiqian Xu
    Jia-jian Zhang
    Guo-jun Wang
    Hai Jiang
    Miao-qing Huang
    Frontiers of Information Technology & Electronic Engineering, 2019, 20 : 773 - 786
  • [28] Attribute-based encryption with outsourced decryption in blockchain
    Zheng, Hui
    Shao, Jun
    Wei, Guiyi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (05) : 1643 - 1655
  • [29] Multi authority attribute based encryption with attribute revocation
    Liu Zhenpeng
    Zhu Xianchao
    Zhang Shouhua
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1872 - 1876
  • [30] A privacy preserving attribute-based encryption scheme with user revocation
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2281 - 2292