CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

被引:1
|
作者
Hwang, Yong-Woon [1 ]
Lee, Im-Yeong [1 ]
机构
[1] Soonchunhyang Univ, Dept Comp Sci & Engn, Asan, South Korea
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2020年 / 14卷 / 10期
关键词
Attributes Based Encryption; Access Control; Attribute revocation; Constant-size ciphertext; Cloud; Data sharing; ENCRYPTION; REVOCATION; SCHEME;
D O I
10.3837/tiis.2020.10.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.
引用
收藏
页码:4136 / 4156
页数:21
相关论文
共 50 条
  • [31] CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy
    Helil, Nurmamat
    Rahman, Kaysar
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [32] CP-ABE based Access Control with Policy Updating and Fast Decryption for Intelligent Manufacturing
    Li, Long
    Gu, Tianlong
    Chang, Liang
    Li, Jingjing
    Qian, Junyan
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (03): : 825 - 836
  • [33] Research on the Update Method of CP-ABE Access Control Strategy Based on Smart Contract
    Hao, Yu
    Cui, Bo
    Li, Ru
    Song, Tingting
    Hou, Wenhan
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2022, PT I, 2022, 460 : 494 - 513
  • [34] A dynamic searchable encryption CP-ABE scheme in cloud storage
    Yi, Jiang
    Hao, Feng
    PROCEEDINGS OF THE 2016 3RD INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING, MANUFACTURING TECHNOLOGY AND CONTROL, 2016, 67 : 478 - 481
  • [35] Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN
    Wu, Zhijun
    Zhang, Yun
    Xu, Enzhong
    FUTURE INTERNET, 2020, 12 (01):
  • [36] New Hidden Policy CP-ABE for Big Data Access Control with Privacy-preserving Policy in Cloud Computing
    Khuntia, Sucharita
    Kumar, P. Syam
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [37] A Verifiable Trust-Based CP-ABE Access Control Scheme for Cloud-Assisted Renewable Energy Systems
    Zhang, Jiyu
    Wu, Kehe
    Yan, Ruomeng
    Tian, Zheng
    Sun, Yizhen
    Wu, Yuxi
    Guo, Yaogong
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (01): : 1211 - 1232
  • [38] PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems
    Sethi, Kamalakanta
    Pradhan, Ankit
    Bera, Padmalochan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1525 - 1550
  • [39] PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems
    Kamalakanta Sethi
    Ankit Pradhan
    Padmalochan Bera
    Cluster Computing, 2021, 24 : 1525 - 1550
  • [40] Improving Privacy-Preserving CP-ABE with Hidden Access Policy
    Zhang, Leyou
    Cui, Yilei
    Mu, Yi
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 596 - 605