Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System

被引:5
|
作者
Yu, Ping [1 ,4 ]
Wen, Qiaoyan [2 ]
Ni, Wei [2 ]
Li, Wenmin [2 ]
Sun, Caijun [3 ]
Zhang, Hua [2 ]
Jin, Zhengping [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Network Secur Res Ctr, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[3] Beijing Univ Posts & Telecommun, Network Secur Res Ctr, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
[4] Univ Technol Sydney, Fac Engn & Informat Technol, Sydney, NSW, Australia
基金
中国国家自然科学基金;
关键词
Hybrid cloud model; Multi-authority CP-ABE; Direct attribute revocation; Private cloud auditing; DATA ACCESS-CONTROL;
D O I
10.1007/s11277-019-06187-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cloud can provide storage space and services for data owners to host their data, where data privacy and confidentiality become critical issues. Ciphertext policy attribute-based encryption (CP-ABE) is one of the most suitable methods to protect data privacy and provide structured access control. In this paper, we propose a multi-authority CP-ABE scheme with a direct attribute revocation mechanism, cause revocation is an inevitable problem in the application process. Under our proposed revocation mechanism, the remaining users need not to update their secret keys when revocation happens. It relies on the matching of public keys' version and ciphertext' version. In a cloud storage model, the update of ciphertext is executed by public cloud, which cannot be fully trusted by data owners. In this case, we propose a hybrid CP-ABE cloud storage model aiming at solving the public cloud trust management problem. The data owners can authorize private cloud to verify whether their ciphertexts have been updated to the newest version. In addition, we prove our construction secure in selective-CPA model. Finally, we compare our scheme with similar multi-authority CP-ABE schemes from functionality, communication overhead and computation cost. The simulation results show that our scheme is more efficient than similar works in encryption, decryption and revocation stages.
引用
收藏
页码:719 / 738
页数:20
相关论文
共 50 条
  • [31] Revocable attribute-based encryption from standard lattices
    Luo, Fucai
    Al-Kuwari, Saif
    Wang, Haiyan
    Wang, Fuqun
    Chen, Kefei
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 84
  • [32] Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing
    Zhao, Xiaolong
    Huang, Zhenjie
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (08): : 10437 - 10453
  • [33] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Wang, Hao
    He, Debiao
    Shen, Jian
    Zheng, Zhihua
    Zhao, Chuan
    Zhao, Minghao
    [J]. SOFT COMPUTING, 2017, 21 (24) : 7325 - 7335
  • [34] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Hao Wang
    Debiao He
    Jian Shen
    Zhihua Zheng
    Chuan Zhao
    Minghao Zhao
    [J]. Soft Computing, 2017, 21 : 7325 - 7335
  • [35] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Xiehua Li
    Yanlong Wang
    Ming Xu
    Yaping Cui
    [J]. China Communications, 2018, 15 (02) : 138 - 152
  • [36] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Li, Xiehua
    Wang, Yanlong
    Xu, Ming
    Cui, Yaping
    [J]. CHINA COMMUNICATIONS, 2018, 15 (02) : 138 - 152
  • [37] Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation
    Yu, Gang
    Ma, Xiaoxiao
    Cao, Zhenfu
    Zhu, Weihua
    Zeng, Guang
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 172 - 179
  • [38] Server-Aided Revocable Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    Li, Yingjiu
    Qin, Baodong
    [J]. COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 570 - 587
  • [39] Revocable attribute-based proxy re-encryption
    Luo, Fucai
    Al-Kuwari, Saif
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 465 - 482
  • [40] BSA: Enhancing Attribute-Based Encryption in Cloud Computing with Decentralized Specification
    Li, Peiyao
    Cao, Heyang
    Wang, Mingsheng
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,