SecCloudSharing: Secure data sharing in public cloud using ciphertext-policy attribute-based proxy re-encryption with revocation

被引:13
作者
Tiwari, Deepnarayan [1 ,2 ]
Gangadharan, G. R. [1 ]
机构
[1] IDRBT, Hyderabad 500057, Andhra Pradesh, India
[2] Univ Hyderabad, Sch Comp & Informat Sci, Hyderabad 500046, Andhra Pradesh, India
关键词
attribute-level revocation; attribute-based access control; CP-ABE; policy-level revocation; public cloud storage; DATA ACCESS-CONTROL; THRESHOLD MULTI-AUTHORITY; STORAGE; KEY; EFFICIENT; PROTOCOL;
D O I
10.1002/dac.3494
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An efficient cryptography mechanism should enforce an access control policy over the encrypted data to provide flexible, fine-grained, and secure data access control for secure sharing of data in cloud storage. To make a secure cloud data sharing solution, we propose a ciphertext-policy attribute-based proxy re-encryption scheme. In the proposed scheme, we design an efficient fine-grained revocation mechanism, which enables not only efficient attribute-level revocation but also efficient policy-level revocation to achieve backward secrecy and forward secrecy. Moreover, we use a multiauthority key attribute center in the key generation phase to overcome the single-point performance bottleneck problem and the key escrow problem. By formal security analysis, we illustrate that our proposed scheme achieves confidentiality, secure key distribution, multiple collusions resistance, and policy- or attribute-revocation security. By comprehensive performance and implementation analysis, we illustrate that our proposed scheme improves the practical efficiency of storage, computation cost, and communication cost compared to the other related schemes.
引用
收藏
页数:28
相关论文
共 50 条
  • [21] Security analysis for a ciphertext-policy attribute-based encryption scheme
    Zeng, Fugeng
    Xu, Chunxiang
    Zhang, Xinpeng
    Advances in Information Sciences and Service Sciences, 2012, 4 (12): : 201 - 207
  • [22] A Survey on Secured Data Sharing using Ciphertext Policy Attribute Based Encryption in Cloud
    Thushara, G. A.
    Bhanu, S. Mary Saira
    2021 8TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS (ICSCC), 2021, : 170 - 177
  • [23] Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud
    Li, Qi
    Zhu, Hongbo
    Ying, Zuobin
    Zhang, Tao
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [24] Secure Lattice-Based Ciphertext-Policy Attribute-Based Encryption From Module-LWE For Cloud Storage
    Sravya, Gudipati
    kumar, Pasupuleti Syam
    Padmavathy, R.
    2023 IEEE 16TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD, 2023, : 554 - 556
  • [25] Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing
    Shi, Yanfeng
    Qiu, Shuo
    ELECTRONICS, 2021, 10 (21)
  • [26] DSSPS: A Data Sharing Security Protection Scheme Based on Consortium Blockchain and Ciphertext-Policy Attribute-Based Encryption
    Han, Daojun
    Chen, Jinyu
    Zang, Guoqing
    Wang, Xueheng
    Gao, Yihua
    ICBTA 2019: 2019 2ND INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, 2019, : 14 - 19
  • [27] Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health
    Wang, Huiyong
    Liang, Jialing
    Ding, Yong
    Tang, Shijie
    Wang, Yujue
    COMPUTER STANDARDS & INTERFACES, 2023, 84
  • [28] Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption
    Mohd Satar, Siti Dhalila
    Hussin, Masnida
    Hanapi, Zurina Mohd
    Mohamed, Mohamad Afendee
    FUTURE INTERNET, 2021, 13 (11):
  • [29] A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram
    Li, Long
    Gu, Tianlong
    Chang, Liang
    Xu, Zhoubo
    Liu, Yining
    Qian, Junyan
    IEEE ACCESS, 2017, 5 : 1137 - 1145
  • [30] Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator
    Chen, Yuechen
    Jiang, Zoe L.
    Yiu, S. M.
    Liu, Joseph K.
    Au, Man Ho
    Wang, Xuan
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 274 - 289