A Cloud-Based Access Control Scheme with User Revocation and Attribute Update

被引:26
|
作者
Zhang, Peng [1 ]
Chen, Zehong [1 ]
Liang, Kaitai [2 ]
Wang, Shulan [1 ]
Wang, Ting [1 ,3 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, ATR Key Lab Natl Def Technol, Shenzhen, Peoples R China
[2] Aalto Univ, Dept Comp Sci, Espoo, Finland
[3] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou, Guangdong, Peoples R China
来源
关键词
Cloud; Access control; Attribute-based encryption; User revocability; Attribute update; CIPHERTEXT DELEGATION; ENCRYPTION;
D O I
10.1007/978-3-319-40253-6_32
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) is a well-known cryptographic technology for guaranteeing data confidentiality but also fine-grained data access control. It enables data owners to define flexible access policy for cloud-based data sharing. However, the user revocation and attribute update problems existing in CP-ABE systems that are long-standing unsolved in the literature. In this paper, we propose the first access control (CP-ABE) scheme supporting user revocability and attribute update. Specifically, the user revocation is defined in the identity-based setting that does not conflict our attribute-based design. The cost brought by attribute update is efficient in the sense that we only concentrate on the update of the ciphertexts associated with the corresponding updated attribute. Moreover, the security analysis shows that the proposed scheme is secure under the decisional Bilinear DiffieHellman assumption.
引用
收藏
页码:525 / 540
页数:16
相关论文
共 50 条
  • [21] Privacy Protection based Access Control Scheme in Cloud-based Services
    Fan, Kai
    Tian, Qiong
    Huang, Nana
    Wang, Yue
    Li, Hui
    Yang, Yintang
    2016 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2016,
  • [22] Privacy Protection Based Access Control Scheme in Cloud-Based Services
    Kai Fan
    Qiong Tian
    Junxiong Wang
    Hui Li
    Yintang Yang
    中国通信, 2017, 14 (01) : 61 - 71
  • [23] A security-attribute-based access control along with user revocation for shared data in multi-owner cloud system
    Raj, Shani
    Kumar, B. Arun
    Venkatesan, G. K. D.
    INFORMATION SECURITY JOURNAL, 2021, 30 (06): : 309 - 324
  • [24] Cloud-Based Fine-Grained Health Information Access Control Framework for Lightweight IoT Devices with Dynamic Auditing and Attribute Revocation
    Yeh, Lo-Yao
    Chiang, Pei-Yu
    Tsai, Yi-Lang
    Huang, Jiun-Long
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 532 - 544
  • [25] Access Control Scheme Supporting Userand Attribute Revocation in Fog Computing
    Wang Z.
    Li L.
    Li N.
    Li, Ling (liling_li_ling@163.com), 1600, Beijing University of Posts and Telecommunications (43): : 88 - 95
  • [26] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [27] An Efficient User's Attribute Revocation Scheme Suitable for Data Outsourcing in Cloud Storage
    Zheng, Fang
    Peng, Xinguang
    Li, Zhidan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [28] Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
    Sun L.
    Zhao Z.
    Wang J.
    Zhu Z.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 47 - 56
  • [29] A privacy preserving attribute-based encryption scheme with user revocation
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2281 - 2292
  • [30] An Attribute-based Access Control Scheme in Cloud Storage Environment
    Xing, M. H.
    Li, W. M.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION TECHNOLOGY (SEIT2015), 2016, : 129 - 134