A Cloud-Based Access Control Scheme with User Revocation and Attribute Update

被引:26
|
作者
Zhang, Peng [1 ]
Chen, Zehong [1 ]
Liang, Kaitai [2 ]
Wang, Shulan [1 ]
Wang, Ting [1 ,3 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, ATR Key Lab Natl Def Technol, Shenzhen, Peoples R China
[2] Aalto Univ, Dept Comp Sci, Espoo, Finland
[3] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou, Guangdong, Peoples R China
来源
关键词
Cloud; Access control; Attribute-based encryption; User revocability; Attribute update; CIPHERTEXT DELEGATION; ENCRYPTION;
D O I
10.1007/978-3-319-40253-6_32
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) is a well-known cryptographic technology for guaranteeing data confidentiality but also fine-grained data access control. It enables data owners to define flexible access policy for cloud-based data sharing. However, the user revocation and attribute update problems existing in CP-ABE systems that are long-standing unsolved in the literature. In this paper, we propose the first access control (CP-ABE) scheme supporting user revocability and attribute update. Specifically, the user revocation is defined in the identity-based setting that does not conflict our attribute-based design. The cost brought by attribute update is efficient in the sense that we only concentrate on the update of the ciphertexts associated with the corresponding updated attribute. Moreover, the security analysis shows that the proposed scheme is secure under the decisional Bilinear DiffieHellman assumption.
引用
收藏
页码:525 / 540
页数:16
相关论文
共 50 条
  • [1] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Xia, Zhihua
    Zhang, Liangao
    Liu, Dandan
    CHINA COMMUNICATIONS, 2016, 13 (07) : 92 - 99
  • [2] Efficient Outsourced Data Access Control with User Revocation for Cloud-based IoT
    Hao, Jialu
    Huang, Cheng
    Liu, Jian
    Xian, Ming
    Shen, Xuemin
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [3] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Zhihua Xia
    Liangao Zhang
    Dandan Liu
    中国通信, 2016, 13 (07) : 92 - 99
  • [4] Efficient Decentralized Attribute-based Access Control for Cloud Storage with User Revocation
    Chen, Jianwei
    Ma, Huadong
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3782 - 3787
  • [5] A survey of attribute-based access control with user revocation in cloud data storage
    Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [6] Access control scheme with attribute revocation for SWIM
    Wu Zhijun
    Cui Zihan
    Wang Caiyun
    Lei Jin
    The Journal of China Universities of Posts and Telecommunications, 2017, (06) : 49 - 54
  • [7] Access control scheme with attribute revocation for SWIM
    Wu Zhijun
    Cui Zihan
    Wang Caiyun
    Lei Jin
    The Journal of China Universities of Posts and Telecommunications, 2017, 24 (06) : 49 - 54
  • [8] A Universal Cloud User Revocation Scheme With Key-Escrow Resistance for Ciphertext-Policy Attribute-Based Access Control
    Sultan, Nazatul Haque
    Barbhuiya, Ferdous Ahmed
    Sarma, Nityananda
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 11 - 18
  • [9] Dual Revocation: Attribute and User Revocation Based On CPABE In Cloud Computing
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2019,
  • [10] A Novel User Revocation Scheme for Key Policy Attribute Based Encryption in Cloud Environments
    Ren, Yifan
    Li, Jie
    Ji, Yusheng
    Das, Sajal K.
    Li, Zhetao
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,