Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption

被引:41
作者
Al-Dahhan, Ruqayah R. [1 ,2 ]
Shi, Qi [2 ]
Lee, Gyu Myoung [2 ]
Kifayat, Kashif [3 ]
机构
[1] Univ Anbar, Coll Comp & Informat Technol, Al Anbar 31001, Iraq
[2] Liverpool John Moores Univ, Dept Comp Sci, Byrom St, Liverpool L3 3AF, Merseyside, England
[3] Air Univ, Dept Comp Sci & Engn, Islamabad 44000, Pakistan
关键词
cloud computing; internet of things; Ciphertext-Policy Attribute-Based encryption; multiauthority schemes; single authority schemes; revocation; THRESHOLD MULTI-AUTHORITY; GRAINED ACCESS-CONTROL; CLOUD STORAGE; IMPROVING PRIVACY; CONTROL SYSTEM; EFFICIENT; SECURITY; SCHEME; INTERNET; ROBUST;
D O I
10.3390/s19071695
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Recently, using advanced cryptographic techniques to process, store, and share data securely in an untrusted cloud environment has drawn widespread attention from academic researchers. In particular, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising, advanced type of encryption technique that resolves an open challenge to regulate fine-grained access control of sensitive data according to attributes, particularly for Internet of Things (IoT) applications. However, although this technique provides several critical functions such as data confidentiality and expressiveness, it faces some hurdles including revocation issues and lack of managing a wide range of attributes. These two issues have been highlighted by many existing studies due to their complexity which is hard to address without high computational cost affecting the resource-limited IoT devices. In this paper, unlike other survey papers, existing single and multiauthority CP-ABE schemes are reviewed with the main focus on their ability to address the revocation issues, the techniques used to manage the revocation, and comparisons among them according to a number of secure cloud storage criteria. Therefore, this is the first review paper analysing the major issues of CP-ABE in the IoT paradigm and explaining the existing approaches to addressing these issues.
引用
收藏
页数:22
相关论文
共 72 条
  • [1] Abraham R.M., 2015, ARPN Journal of Engineering and Applied Sciences, V10, P5588
  • [2] CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
    AKL, SG
    TAYLOR, PD
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03): : 239 - 248
  • [3] [Anonymous], 2012, ARXIV12084877
  • [4] [Anonymous], ARXIV14073660
  • [5] [Anonymous], P 2015 IEEE INT C CO
  • [6] [Anonymous], 2016, INT J NETW SECUR
  • [7] [Anonymous], INT J SCI ENG RES
  • [8] [Anonymous], INT J ENG SCI
  • [9] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [10] Integration of Cloud computing and Internet of Things: A survey
    Botta, Alessio
    de Donato, Walter
    Persico, Valerio
    Pescape, Antonio
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 : 684 - 700