A Cloud-Based Access Control Scheme with User Revocation and Attribute Update

被引:26
|
作者
Zhang, Peng [1 ]
Chen, Zehong [1 ]
Liang, Kaitai [2 ]
Wang, Shulan [1 ]
Wang, Ting [1 ,3 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, ATR Key Lab Natl Def Technol, Shenzhen, Peoples R China
[2] Aalto Univ, Dept Comp Sci, Espoo, Finland
[3] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou, Guangdong, Peoples R China
来源
关键词
Cloud; Access control; Attribute-based encryption; User revocability; Attribute update; CIPHERTEXT DELEGATION; ENCRYPTION;
D O I
10.1007/978-3-319-40253-6_32
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) is a well-known cryptographic technology for guaranteeing data confidentiality but also fine-grained data access control. It enables data owners to define flexible access policy for cloud-based data sharing. However, the user revocation and attribute update problems existing in CP-ABE systems that are long-standing unsolved in the literature. In this paper, we propose the first access control (CP-ABE) scheme supporting user revocability and attribute update. Specifically, the user revocation is defined in the identity-based setting that does not conflict our attribute-based design. The cost brought by attribute update is efficient in the sense that we only concentrate on the update of the ciphertexts associated with the corresponding updated attribute. Moreover, the security analysis shows that the proposed scheme is secure under the decisional Bilinear DiffieHellman assumption.
引用
收藏
页码:525 / 540
页数:16
相关论文
共 50 条
  • [41] Accountable specific attribute-based encryption scheme for cloud access control
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [42] An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing
    Xie, Xingxing
    Ma, Hua
    Li, Jin
    Chen, Xiaofeng
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (16) : 2349 - 2367
  • [43] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Zhiwei Wu
    Run-hua Shi
    Kunchang Li
    Yifan Yang
    Cluster Computing, 2022, 25 : 3899 - 3913
  • [44] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Wu, Zhiwei
    Shi, Run-hua
    Li, Kunchang
    Yang, Yifan
    Cluster Computing, 2022, 25 (06) : 3899 - 3913
  • [45] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Wu, Zhiwei
    Shi, Run-hua
    Li, Kunchang
    Yang, Yifan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 3899 - 3913
  • [46] A Flexible Access Control with User Revocation in Fog-Enabled Cloud Computing
    Nagarani, C.
    Kousalya, R.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 909 - 914
  • [47] A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage
    Kim, Jongkil
    Nepal, Surya
    DATA SCIENCE AND ENGINEERING, 2016, 1 (03) : 149 - 160
  • [48] A cloud based enhanced CPABE framework for efficient user and attribute-level revocation
    Chawla S.
    Gupta N.
    International Journal of Computers and Applications, 2023, 45 (7-8) : 523 - 533
  • [50] ABR: A new efficient attribute based revocation on access control system
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 735 - 740