Revocable Attribute-Based Encryption With Data Integrity in Clouds

被引:108
|
作者
Ge, Chunpeng [1 ,2 ,3 ,4 ]
Susilo, Willy [4 ]
Baek, Joonsang [4 ]
Liu, Zhe [1 ]
Xia, Jinyue [5 ]
Fang, Liming [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Nanjing 210016, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Sci & Technol Parallel & Distributed Proc Lab PDL, Changsha 410000, Peoples R China
[4] Univ Wollongong, Wollongong, NSW 2522, Australia
[5] IBM Corp, Armonk, NY 10504 USA
基金
国家重点研发计划; 澳大利亚研究理事会; 中国国家自然科学基金;
关键词
Encryption; Cloud computing; Cryptography; Data integrity; Servers; Finance; Systems architecture; Attribute-based encryption; data integrity; cloud computing; revocable; CIPHERTEXT;
D O I
10.1109/TDSC.2021.3065999
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing enables enterprises and individuals to outsource and share their data. This way, cloud computing eliminates the heavy workload of local information infrastructure. Attribute-based encryption has become a promising solution for encrypted data access control in clouds due to the ability to achieve one-to-many encrypted data sharing. Revocation is a critical requirement for encrypted data access control systems. After outsourcing the encrypted attribute-based ciphertext to the cloud, the data owner may want to revoke some recipients that were authorized previously, which means that the outsourced attribute-based ciphertext needs to be updated to a new one that is under the revoked policy. The integrity issue arises when the revocation is executed. When a new ciphertext with the revoked access policy is generated by the cloud server, the data recipient cannot be sure that the newly generated ciphertext guarantees to be decrypted to the same plaintext as the originally encrypted data, since the cloud server is provided by a third party, which is not fully trusted. In this article, we consider a new security requirement for the revocable attribute-based encryption schemes: integrity. We introduce a formal definition and security model for the revocable attribute-based encryption with data integrity protection (RABE-DI). Then, we propose a concrete RABE-DI scheme and prove its confidentiality and integrity under the defined security model. Finally, we present an implementation result and provide performance evaluation which shows that our scheme is efficient and practical.
引用
收藏
页码:2864 / 2872
页数:9
相关论文
共 50 条
  • [1] Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity
    Chen, Shaobo
    Li, Jiguo
    Zhang, Yichen
    Han, Jinguang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10441 - 10451
  • [2] Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free
    Huang, Meijuan
    Liu, Yutian
    Yang, Bo
    Zhao, Yanqi
    Zhang, Mingrui
    [J]. INFORMATION, 2024, 15 (01)
  • [3] Revocable Attribute-Based Data Storage in Mobile Clouds
    Deng, Hua
    Qin, Zheng
    Wu, Qianhong
    Guan, Zhenyu
    Yin, Hui
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) : 1130 - 1142
  • [4] Revocable and Decentralized Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    [J]. COMPUTER JOURNAL, 2016, 59 (08): : 1220 - 1235
  • [5] Efficient revocable attribute-based encryption scheme
    Li, Xuejun
    Zhang, Dan
    Li, Hui
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 32 - 39
  • [6] Fully secure revocable attribute-based encryption
    Qian J.-L.
    Dong X.-L.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (4) : 490 - 496
  • [7] Fully Secure Revocable Attribute-Based Encryption
    钱俊磊
    董晓蕾
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (04) : 490 - 496
  • [8] Forward-Secure Data Outsourcing Based on Revocable Attribute-Based Encryption
    Hoang, Van-Hoan
    Lehtihet, Elyes
    Ghamri-Doudane, Yacine
    [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1839 - 1846
  • [9] Efficient Revocable Attribute-Based Encryption with Hidden Policies
    Ziegler, Dominik
    Marsalek, Alexander
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1638 - 1645
  • [10] Revocable attribute-based encryption from standard lattices
    Luo, Fucai
    Al-Kuwari, Saif
    Wang, Haiyan
    Wang, Fuqun
    Chen, Kefei
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 84