SecCloudSharing: Secure data sharing in public cloud using ciphertext-policy attribute-based proxy re-encryption with revocation

被引:14
作者
Tiwari, Deepnarayan [1 ,2 ]
Gangadharan, G. R. [1 ]
机构
[1] IDRBT, Hyderabad 500057, Andhra Pradesh, India
[2] Univ Hyderabad, Sch Comp & Informat Sci, Hyderabad 500046, Andhra Pradesh, India
关键词
attribute-level revocation; attribute-based access control; CP-ABE; policy-level revocation; public cloud storage; DATA ACCESS-CONTROL; THRESHOLD MULTI-AUTHORITY; STORAGE; KEY; EFFICIENT; PROTOCOL;
D O I
10.1002/dac.3494
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An efficient cryptography mechanism should enforce an access control policy over the encrypted data to provide flexible, fine-grained, and secure data access control for secure sharing of data in cloud storage. To make a secure cloud data sharing solution, we propose a ciphertext-policy attribute-based proxy re-encryption scheme. In the proposed scheme, we design an efficient fine-grained revocation mechanism, which enables not only efficient attribute-level revocation but also efficient policy-level revocation to achieve backward secrecy and forward secrecy. Moreover, we use a multiauthority key attribute center in the key generation phase to overcome the single-point performance bottleneck problem and the key escrow problem. By formal security analysis, we illustrate that our proposed scheme achieves confidentiality, secure key distribution, multiple collusions resistance, and policy- or attribute-revocation security. By comprehensive performance and implementation analysis, we illustrate that our proposed scheme improves the practical efficiency of storage, computation cost, and communication cost compared to the other related schemes.
引用
收藏
页数:28
相关论文
共 50 条
[21]   Security analysis for a ciphertext-policy attribute-based encryption scheme [J].
Zeng, Fugeng ;
Xu, Chunxiang ;
Zhang, Xinpeng .
Advances in Information Sciences and Service Sciences, 2012, 4 (12) :201-207
[22]   A Survey on Secured Data Sharing using Ciphertext Policy Attribute Based Encryption in Cloud [J].
Thushara, G. A. ;
Bhanu, S. Mary Saira .
2021 8TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS (ICSCC), 2021, :170-177
[23]   Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud [J].
Li, Qi ;
Zhu, Hongbo ;
Ying, Zuobin ;
Zhang, Tao .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
[24]   Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing [J].
Shi, Yanfeng ;
Qiu, Shuo .
ELECTRONICS, 2021, 10 (21)
[25]   Secure Lattice-Based Ciphertext-Policy Attribute-Based Encryption From Module-LWE For Cloud Storage [J].
Sravya, Gudipati ;
kumar, Pasupuleti Syam ;
Padmavathy, R. .
2023 IEEE 16TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD, 2023, :554-556
[26]   DSSPS: A Data Sharing Security Protection Scheme Based on Consortium Blockchain and Ciphertext-Policy Attribute-Based Encryption [J].
Han, Daojun ;
Chen, Jinyu ;
Zang, Guoqing ;
Wang, Xueheng ;
Gao, Yihua .
ICBTA 2019: 2019 2ND INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, 2019, :14-19
[27]   Embedding lightweight proxy re-encryption for efficient attribute revocation in cloud computing [J].
Fugkeaw S. ;
Sato H. .
International Journal of High Performance Computing and Networking, 2016, 9 (04) :299-309
[28]   Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health [J].
Wang, Huiyong ;
Liang, Jialing ;
Ding, Yong ;
Tang, Shijie ;
Wang, Yujue .
COMPUTER STANDARDS & INTERFACES, 2023, 84
[29]   Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption [J].
Mohd Satar, Siti Dhalila ;
Hussin, Masnida ;
Hanapi, Zurina Mohd ;
Mohamed, Mohamad Afendee .
FUTURE INTERNET, 2021, 13 (11)
[30]   A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram [J].
Li, Long ;
Gu, Tianlong ;
Chang, Liang ;
Xu, Zhoubo ;
Liu, Yining ;
Qian, Junyan .
IEEE ACCESS, 2017, 5 :1137-1145