Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation

被引:1
|
作者
Islam, Md Azharul [1 ]
Madria, Sanjay [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
关键词
attribute based encryption; revocation; secure cloud data sharing;
D O I
10.1002/spy2.336
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is a prominent cryptographic tool for secure data sharing in the cloud because it can be used to enforce very expressive and fine-grained access control on outsourced data. The revocation in ABE remains a challenging problem as most of the revocation techniques available today, suffer from the collusion attack. The revocable ABE schemes which are collusion resistant require a semi-trusted manager to update the secret keys of nonrevoked users in order to achieve revocation. This introduces computation and communication overhead, and also increases the overall security vulnerability. In this paper, we propose two collusion resistant revocable ABE schemes that do not require any semi-trusted entity. Our first scheme supports revocation at the user-level that is equivalent to revoking all the attributes from a user. Our second scheme supports revocation at the attribute-level that enables more fine-grained revocation by allowing selective attribute(s) revocation from a user. We call them user-level revocable ABE (ULR-ABE) and attribute-level revocable ABE (ALR-ABE), respectively. For both the schemes, the secret keys of the nonrevoked users are never affected and the decryption algorithm has the same performance as the baseline ABE scheme. We are able to achieve these at the cost of some increase (compared to the baseline scheme) in the size of the secret key and the ciphertext.
引用
收藏
页数:23
相关论文
共 50 条
  • [41] Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data
    Liu, Ximeng
    Ma, Jianfeng
    Xiong, Jinbo
    Liu, Guangjun
    International Journal of Network Security, 2014, 16 (06) : 437 - 443
  • [42] Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme
    Sepehri, Masoomeh
    Trombetta, Alberto
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [43] Hierarchy Attribute-Based Encryption Scheme to Support Direct Revocation in Cloud Storage
    Jiang Shuci
    Guo Weibin
    Fan Guisheng
    2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 869 - 874
  • [44] Secure Data Sharing and Retrieval Using Attribute-Based Encryption in Cloud-Based OSNs
    HUANG Qinlong
    MA Zhaofeng
    YANG Yixian
    FU Jingyi
    NIU Xinxin
    Chinese Journal of Electronics, 2014, 23 (03) : 557 - 563
  • [45] Cloud based data sharing with fine-grained proxy re-encryption
    Yang, Yanjiang
    Zhu, Haiyan
    Lu, Haibing
    Weng, Jian
    Zhang, Youcheng
    Choo, Kim-Kwang Raymond
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 122 - 134
  • [46] Secure Data Sharing and Retrieval Using Attribute-Based Encryption in Cloud-Based OSNs
    Huang Qinlong
    Ma Zhaofeng
    Yang Yixian
    Fu Jingyi
    Niu Xinxin
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (03) : 557 - 563
  • [47] BDAE: A Blockchain-Based and Decentralized Attribute-Based Encryption Scheme for Secure Data Sharing
    YANG Shuangxi
    WuhanUniversityJournalofNaturalSciences, 2024, 29 (03) : 228 - 238
  • [48] Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing
    Zhang, Yinghui
    Chen, Xiaofeng
    Li, Jin
    Li, Hui
    Li, Fenghua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4028 - 4049
  • [49] SecCloudSharing: Secure data sharing in public cloud using ciphertext-policy attribute-based proxy re-encryption with revocation
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (05)
  • [50] Generic attribute revocation systems for attribute-based encryption in cloud storage
    Chen, Genlang
    Xu, Zhiqian
    Zhang, Jia-jian
    Wang, Guo-jun
    Jiang, Hai
    Huang, Miao-qing
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (06) : 773 - 786