Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption

被引:41
作者
Al-Dahhan, Ruqayah R. [1 ,2 ]
Shi, Qi [2 ]
Lee, Gyu Myoung [2 ]
Kifayat, Kashif [3 ]
机构
[1] Univ Anbar, Coll Comp & Informat Technol, Al Anbar 31001, Iraq
[2] Liverpool John Moores Univ, Dept Comp Sci, Byrom St, Liverpool L3 3AF, Merseyside, England
[3] Air Univ, Dept Comp Sci & Engn, Islamabad 44000, Pakistan
关键词
cloud computing; internet of things; Ciphertext-Policy Attribute-Based encryption; multiauthority schemes; single authority schemes; revocation; THRESHOLD MULTI-AUTHORITY; GRAINED ACCESS-CONTROL; CLOUD STORAGE; IMPROVING PRIVACY; CONTROL SYSTEM; EFFICIENT; SECURITY; SCHEME; INTERNET; ROBUST;
D O I
10.3390/s19071695
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Recently, using advanced cryptographic techniques to process, store, and share data securely in an untrusted cloud environment has drawn widespread attention from academic researchers. In particular, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising, advanced type of encryption technique that resolves an open challenge to regulate fine-grained access control of sensitive data according to attributes, particularly for Internet of Things (IoT) applications. However, although this technique provides several critical functions such as data confidentiality and expressiveness, it faces some hurdles including revocation issues and lack of managing a wide range of attributes. These two issues have been highlighted by many existing studies due to their complexity which is hard to address without high computational cost affecting the resource-limited IoT devices. In this paper, unlike other survey papers, existing single and multiauthority CP-ABE schemes are reviewed with the main focus on their ability to address the revocation issues, the techniques used to manage the revocation, and comparisons among them according to a number of secure cloud storage criteria. Therefore, this is the first review paper analysing the major issues of CP-ABE in the IoT paradigm and explaining the existing approaches to addressing these issues.
引用
收藏
页数:22
相关论文
共 72 条
[41]   Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation [J].
Li, Yang ;
Zhu, Jianming ;
Wang, Xiuli ;
Chai, Yanmei ;
Shao, Shuai .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06) :385-394
[42]  
Lin H, 2008, LECT NOTES COMPUT SC, V5365, P426
[43]   A scheme of hidden-structure attribute-based encryption with multiple authorities [J].
Ling, J. ;
Weng, A. X. .
INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION AND AUTOMATION ENGINEERING, 2018, 359
[44]   Secure and fine-grained access control on e-healthcare records in mobile cloud computing [J].
Liu, Yi ;
Zhang, Yinghui ;
Ling, Jie ;
Liu, Zhusong .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :1020-1026
[45]  
Liu Z, 2011, LECT NOTES COMPUT SC, V6879, P278, DOI 10.1007/978-3-642-23822-2_16
[46]  
Mete V.I., 2016, International Research Journal of Engineering and Technology (IRJET), V3, P1740
[47]  
More M., 2017, International Journal of Advance Research, Ideas and Innovations in Technology, vol, V3, P1220
[48]   CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage [J].
Ning, Jianting ;
Cao, Zhenfu ;
Dong, Xiaolei ;
Liang, Kaitai ;
Wei, Lifei ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (01) :111-124
[49]   Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment [J].
Odelu, Vanga ;
Das, Ashok Kumar ;
Rao, Y. Sreenivasa ;
Kumari, Saru ;
Khan, Muhammad Khurram ;
Choo, Kim-Kwang Raymond .
COMPUTER STANDARDS & INTERFACES, 2017, 54 :3-9
[50]  
Rudra D.V., 2018, International Journal of Innovative Research in Science, Engineering and Technology vol, V7, P90