Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System

被引:5
|
作者
Yu, Ping [1 ,4 ]
Wen, Qiaoyan [2 ]
Ni, Wei [2 ]
Li, Wenmin [2 ]
Sun, Caijun [3 ]
Zhang, Hua [2 ]
Jin, Zhengping [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Network Secur Res Ctr, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[3] Beijing Univ Posts & Telecommun, Network Secur Res Ctr, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
[4] Univ Technol Sydney, Fac Engn & Informat Technol, Sydney, NSW, Australia
基金
中国国家自然科学基金;
关键词
Hybrid cloud model; Multi-authority CP-ABE; Direct attribute revocation; Private cloud auditing; DATA ACCESS-CONTROL;
D O I
10.1007/s11277-019-06187-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cloud can provide storage space and services for data owners to host their data, where data privacy and confidentiality become critical issues. Ciphertext policy attribute-based encryption (CP-ABE) is one of the most suitable methods to protect data privacy and provide structured access control. In this paper, we propose a multi-authority CP-ABE scheme with a direct attribute revocation mechanism, cause revocation is an inevitable problem in the application process. Under our proposed revocation mechanism, the remaining users need not to update their secret keys when revocation happens. It relies on the matching of public keys' version and ciphertext' version. In a cloud storage model, the update of ciphertext is executed by public cloud, which cannot be fully trusted by data owners. In this case, we propose a hybrid CP-ABE cloud storage model aiming at solving the public cloud trust management problem. The data owners can authorize private cloud to verify whether their ciphertexts have been updated to the newest version. In addition, we prove our construction secure in selective-CPA model. Finally, we compare our scheme with similar multi-authority CP-ABE schemes from functionality, communication overhead and computation cost. The simulation results show that our scheme is more efficient than similar works in encryption, decryption and revocation stages.
引用
收藏
页码:719 / 738
页数:20
相关论文
共 50 条
  • [1] Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System
    Ping Yu
    Qiaoyan Wen
    Wei Ni
    Wenmin Li
    Caijun Sun
    Hua Zhang
    Zhengping Jin
    [J]. Wireless Personal Communications, 2019, 106 : 719 - 738
  • [2] Revocable and Decentralized Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    [J]. COMPUTER JOURNAL, 2016, 59 (08): : 1220 - 1235
  • [3] Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity
    Chen, Shaobo
    Li, Jiguo
    Zhang, Yichen
    Han, Jinguang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10441 - 10451
  • [4] Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud
    Li, Ximing
    Wang, Hao
    Ma, Sha
    Xiao, Meiyan
    Huang, Qiong
    [J]. CYBERSECURITY, 2024, 7 (01)
  • [5] Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud
    Ximing Li
    Hao Wang
    Sha Ma
    Meiyan Xiao
    Qiong Huang
    [J]. Cybersecurity, 7
  • [6] Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing
    Lyu, Maoxu
    Li, Xuejun
    Li, Hui
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 195 - 204
  • [7] Attribute Revocable Attribute-Based Encryption for Decentralized Disruption-Tolerant Military Networks
    Nomura, Kenta
    Mohri, Masami
    Ii, Yoshiaki Si Iiraisi
    Morii, Masakatu
    [J]. PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2015, : 491 - 494
  • [8] Revocable Attribute-based Encryption with Escrow-free in Cloud Storage
    Zhao Zhiyuan
    Zhu Zhiqiang
    Wang Jianhua
    Sun Lei
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (01) : 1 - 10
  • [9] Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption
    Jing Li
    Xiong Li
    Licheng Wang
    Debiao He
    Haseeb Ahmad
    Xinxin Niu
    [J]. Soft Computing, 2018, 22 : 707 - 714
  • [10] Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption
    Li, Jing
    Li, Xiong
    Wang, Licheng
    He, Debiao
    Ahmad, Haseeb
    Niu, Xinxin
    [J]. SOFT COMPUTING, 2018, 22 (03) : 707 - 714