Access control scheme with attribute revocation for SWIM

被引:0
|
作者
Wu Zhijun
Cui Zihan
Wang Caiyun
Lei Jin
机构
[1] SchoolofElectronicInformationandAutomation,CivilAviationUniversityofChina
关键词
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
摘要
Access control scheme is proposed for System Wide Information Management(SWIM) to address the problem of attribute revocation in practical applications.Based on the attribute based encryption(ABE),this scheme introduces the proxy re-encryption mechanism and key encrypting key(KEK) tree to realize fine-grained access control with attribute revocation.This paper defines the attributes according to the status quo of civil aviation.Compared with some other schemes proposed before,this scheme not only shortens the length of ciphertext(CT) and private key but also improves the efficiency of encryption and decryption.The scheme can resist collusion attacks and ensure the security of data in SWIM.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [1] Access control scheme with attribute revocation for SWIM
    Wu Zhijun
    Cui Zihan
    Wang Caiyun
    Lei Jin
    The Journal of China Universities of Posts and Telecommunications, 2017, (06) : 49 - 54
  • [2] Access Control Scheme Supporting Userand Attribute Revocation in Fog Computing
    Wang Z.
    Li L.
    Li N.
    Li, Ling (liling_li_ling@163.com), 1600, Beijing University of Posts and Telecommunications (43): : 88 - 95
  • [3] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Xia, Zhihua
    Zhang, Liangao
    Liu, Dandan
    CHINA COMMUNICATIONS, 2016, 13 (07) : 92 - 99
  • [4] A Cloud-Based Access Control Scheme with User Revocation and Attribute Update
    Zhang, Peng
    Chen, Zehong
    Liang, Kaitai
    Wang, Shulan
    Wang, Ting
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 525 - 540
  • [5] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Zhihua Xia
    Liangao Zhang
    Dandan Liu
    中国通信, 2016, 13 (07) : 92 - 99
  • [6] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [7] An Access Control Scheme with Direct Cloud-Aided Attribute Revocation Using Version Key
    Shi, Jiaoli
    Huang, Chuanhe
    Wang, Jing
    He, Kai
    Wang, Jinhai
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2014, PT I, 2014, 8630 : 429 - 442
  • [8] A secure and efficient access control scheme with attribute revocation and merging capabilities for fog-enabled IoT?
    Sarma, Richa
    Barbhuiya, Ferdous Ahmed
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [9] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Zhiwei Wu
    Run-hua Shi
    Kunchang Li
    Yifan Yang
    Cluster Computing, 2022, 25 : 3899 - 3913
  • [10] Attribute-based data access control scheme with secure revocation in fog computing for smart grid
    Wu, Zhiwei
    Shi, Run-hua
    Li, Kunchang
    Yang, Yifan
    Cluster Computing, 2022, 25 (06) : 3899 - 3913