Access control scheme with attribute revocation for SWIM

被引:0
|
作者
Wu Zhijun
Cui Zihan
Wang Caiyun
Lei Jin
机构
[1] SchoolofElectronicInformationandAutomation,CivilAviationUniversityofChina
关键词
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
摘要
Access control scheme is proposed for System Wide Information Management(SWIM) to address the problem of attribute revocation in practical applications.Based on the attribute based encryption(ABE),this scheme introduces the proxy re-encryption mechanism and key encrypting key(KEK) tree to realize fine-grained access control with attribute revocation.This paper defines the attributes according to the status quo of civil aviation.Compared with some other schemes proposed before,this scheme not only shortens the length of ciphertext(CT) and private key but also improves the efficiency of encryption and decryption.The scheme can resist collusion attacks and ensure the security of data in SWIM.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [21] An Attribute Based Encryption Scheme with Fine-Grained Attribute Revocation
    Li, Qiang
    Feng, Dengguo
    Zhang, Liwu
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 885 - 890
  • [22] Efficient Decentralized Attribute-based Access Control for Cloud Storage with User Revocation
    Chen, Jianwei
    Ma, Huadong
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3782 - 3787
  • [23] Achieving Multi-Authority Access Control with Efficient Attribute Revocation in Smart Grid
    Liu, Dongxiao
    Li, Hongwei
    Yang, Yi
    Yang, Haomiao
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 634 - 639
  • [24] A survey of attribute-based access control with user revocation in cloud data storage
    Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [25] Searchable attribute-based encryption scheme with attribute revocation in cloud storage
    Wang, Shangping
    Zhao, Duqiao
    Zhang, Yaling
    PLOS ONE, 2017, 12 (08):
  • [26] Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing
    School of Mathematics and Statistics, Xidian Univ., Xi'an
    710071, China
    Xi'an Dianzi Keji Daxue Xuebao, 6 (6-10 and 55):
  • [27] A Universal Cloud User Revocation Scheme With Key-Escrow Resistance for Ciphertext-Policy Attribute-Based Access Control
    Sultan, Nazatul Haque
    Barbhuiya, Ferdous Ahmed
    Sarma, Nityananda
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 11 - 18
  • [28] An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation
    Sultan, Nazatul Haque
    Varadharajan, Vijay
    Camtepe, Seyit
    Nepal, Surya
    COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 569 - 590
  • [29] A blockchain based access control scheme with hidden policy and attribute
    Wu, Nannan
    Xu, Lei
    Zhu, Liehuang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 141 : 186 - 196
  • [30] Location Hierarchical Access Control Scheme based on Attribute Encryption
    Lin, Xi
    Han, Yiliang
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 9010 - 9014