SecCloudSharing: Secure data sharing in public cloud using ciphertext-policy attribute-based proxy re-encryption with revocation

被引:14
作者
Tiwari, Deepnarayan [1 ,2 ]
Gangadharan, G. R. [1 ]
机构
[1] IDRBT, Hyderabad 500057, Andhra Pradesh, India
[2] Univ Hyderabad, Sch Comp & Informat Sci, Hyderabad 500046, Andhra Pradesh, India
关键词
attribute-level revocation; attribute-based access control; CP-ABE; policy-level revocation; public cloud storage; DATA ACCESS-CONTROL; THRESHOLD MULTI-AUTHORITY; STORAGE; KEY; EFFICIENT; PROTOCOL;
D O I
10.1002/dac.3494
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An efficient cryptography mechanism should enforce an access control policy over the encrypted data to provide flexible, fine-grained, and secure data access control for secure sharing of data in cloud storage. To make a secure cloud data sharing solution, we propose a ciphertext-policy attribute-based proxy re-encryption scheme. In the proposed scheme, we design an efficient fine-grained revocation mechanism, which enables not only efficient attribute-level revocation but also efficient policy-level revocation to achieve backward secrecy and forward secrecy. Moreover, we use a multiauthority key attribute center in the key generation phase to overcome the single-point performance bottleneck problem and the key escrow problem. By formal security analysis, we illustrate that our proposed scheme achieves confidentiality, secure key distribution, multiple collusions resistance, and policy- or attribute-revocation security. By comprehensive performance and implementation analysis, we illustrate that our proposed scheme improves the practical efficiency of storage, computation cost, and communication cost compared to the other related schemes.
引用
收藏
页数:28
相关论文
共 50 条
[31]   Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator [J].
Chen, Yuechen ;
Jiang, Zoe L. ;
Yiu, S. M. ;
Liu, Joseph K. ;
Au, Man Ho ;
Wang, Xuan .
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 :274-289
[32]   A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation [J].
Li, Jiguo ;
Hu, Shengzhou ;
Zhang, Yichen ;
Han, Jinguang .
SOFT COMPUTING, 2020, 24 (03) :1869-1882
[33]   HHDSSC: Harnessing healthcare data security in cloud using ciphertext policy attribute-based encryption [J].
Ramesh D. ;
Sharma R.P. ;
Edla D.R. .
International Journal of Information and Computer Security, 2020, 13 (3-4) :322-336
[34]   Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing [J].
Yin, Hongjian ;
Zhang, Leyou ;
Cui, Yilei .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05) :2768-2780
[35]   Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing [J].
Tu, Shanshan ;
Huang, Fengming ;
Zhang, Shengju ;
Badshah, Akhtar ;
Alasmary, Hisham ;
Waqas, Muhammad .
2022 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS, CITS, 2022, :116-122
[36]   PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption [J].
Han, Jinguang ;
Susilo, Willy ;
Mu, Yi ;
Zhou, Jianying ;
Au, Man Ho .
COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 :73-90
[37]   Cloud based data sharing with fine-grained proxy re-encryption [J].
Yang, Yanjiang ;
Zhu, Haiyan ;
Lu, Haibing ;
Weng, Jian ;
Zhang, Youcheng ;
Choo, Kim-Kwang Raymond .
PERVASIVE AND MOBILE COMPUTING, 2016, 28 :122-134
[38]   A Universal Cloud User Revocation Scheme With Key-Escrow Resistance for Ciphertext-Policy Attribute-Based Access Control [J].
Sultan, Nazatul Haque ;
Barbhuiya, Ferdous Ahmed ;
Sarma, Nityananda .
SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, :11-18
[39]   Ciphertext-Policy Attribute-Based Encryption for Cloud Storage: Toward Data Privacy and Authentication in AI-Enabled IoT System [J].
Chinnasamy, P. ;
Deepalakshmi, P. ;
Dutta, Ashit Kumar ;
You, Jinsang ;
Joshi, Gyanendra Prasad .
MATHEMATICS, 2022, 10 (01)
[40]   You Are Revoked and Out: Towards Directly Revocable Ciphertext-Policy Attribute-Based Encryption [J].
Yang, Feng ;
Liu, Limin ;
You, Weijing ;
Jing, Jiwu .
SECURITY AND COMMUNICATION NETWORKS, 2022, 2022