Access control scheme with attribute revocation for SWIM

被引:0
|
作者
Wu Zhijun
Cui Zihan
Wang Caiyun
Lei Jin
机构
[1] SchoolofElectronicInformationandAutomation,CivilAviationUniversityofChina
关键词
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
摘要
Access control scheme is proposed for System Wide Information Management(SWIM) to address the problem of attribute revocation in practical applications.Based on the attribute based encryption(ABE),this scheme introduces the proxy re-encryption mechanism and key encrypting key(KEK) tree to realize fine-grained access control with attribute revocation.This paper defines the attributes according to the status quo of civil aviation.Compared with some other schemes proposed before,this scheme not only shortens the length of ciphertext(CT) and private key but also improves the efficiency of encryption and decryption.The scheme can resist collusion attacks and ensure the security of data in SWIM.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [31] A REVIEW ON ATTRIBUTE BASED ACCESS CONTROL SCHEME IN CLOUD ENVIRONMENT
    Divya, S.
    Ananthi, B.
    Shanmugavalli, V.
    IIOAB JOURNAL, 2016, 7 (09) : 568 - 574
  • [32] Attribute-based Access Control for ICN Naming Scheme
    Li, Bing
    Huang, Dijiang
    Wang, Zhijie
    Zhu, Yan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (02) : 194 - 206
  • [33] Attribute-based Access Control for ICN Naming Scheme
    Li, Bing
    Verleker, Ashwin Prabhu
    Huang, Dijiang
    Wang, Zhijie
    Zhu, Yan
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 391 - 399
  • [34] Enabling Attribute Revocation for Fine-Grained Access Control in Blockchain-IoT Systems
    Yu, Guangsheng
    Zha, Xuan
    Wang, Xu
    Ni, Wei
    Yu, Kan
    Yu, Ping
    Zhang, J. Andrew
    Liu, Ren Ping
    Guo, Y. Jay
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2020, 67 (04) : 1213 - 1230
  • [35] e-SAFE: A secure and efficient access control scheme with attribute convergence and user revocation in fog enhanced IoT for E-Health
    Sarma, Richa
    Moulik, Sanjay
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [36] A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation
    Zhang, Ruoqing
    Hui, Lucas
    Yiu, Sm
    Yu, Xiaoqi
    Liu, Zechao
    Jiang, Zoe L.
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 363 - 370
  • [37] Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
    Sun L.
    Zhao Z.
    Wang J.
    Zhu Z.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 47 - 56
  • [38] Multi-authority Attribute Based Encryption Scheme with Revocation
    Huang, XiaoFang
    Tao, Qi
    Qin, BaoDong
    Liu, ZhiQin
    24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [39] Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing
    Huang, Qinlong
    Ma, Zhaofeng
    Fu, Jingyi
    Niu, Xinxin
    Yang, Yixian
    JOURNAL OF COMPUTERS, 2013, 8 (11) : 2776 - 2781
  • [40] A Secure and Efficient Revocation Scheme for Fine-Grained Access Control in Cloud Storage
    Lv, Zhiquan
    Hong, Cheng
    Zhang, Min
    Feng, Dengguo
    2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,