Blockchain-based cloud storage system with CP-ABE-based access control and revocation process

被引:24
作者
Sharma, Pratima [1 ]
Jindal, Rajni [1 ]
Borah, Malaya Dutta [2 ]
机构
[1] Delhi Technol Univ, Dept Comp Sci & Engn, Delhi, India
[2] Natl Inst Technol, Dept Comp Sci & Engn, Silchar, Assam, India
关键词
Blockchain; Cloud storage; CP-ABE; Access control; Revocation; ATTRIBUTE-BASED ENCRYPTION; DATA-SECURITY; CHALLENGES; SCHEME;
D O I
10.1007/s11227-021-04179-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud system provides an on-demand and low-cost computing and storing model. Many organizations and individual end-users are using cloud storage services to back up their crucial data. However, this storage utility suffers from various threats and security issues. Before outsourcing the data to the cloud server, some data security measures should be imposed to ensure security. The blockchain is an advanced technology that stores data in a distributed manner and provides a more secure environment. Therefore, we propose a blockchain-based framework with the Ciphertext Policy Attribute-based Encryption algorithm to provide access control and user revocation methods in the cloud storage system to resolve the above issues. Our scheme offers three main features to provide a secure environment. First, a java-based blockchain network is designed to register data owners and attribute authority using a key generation algorithm. Second, the data owners and attribute authorities store the public information in the blockchain structure, set access policies, and generate the user's secret key to resolve key escrow problems. Third, the immediate attribute modification is deployed to attain fine-grained access control with the user revocation process. The experimental results, analysis, and performance evaluation show that our scheme provides a feasible and reliable environment.
引用
收藏
页码:7700 / 7728
页数:29
相关论文
共 54 条
  • [1] Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
  • [2] Attrapadung N, 2009, LECT NOTES COMPUT SC, V5921, P278, DOI 10.1007/978-3-642-10868-6_17
  • [3] Query optimization mechanisms in the cloud environments: A systematic study
    Azhir, Elham
    Navimipour, Nima Jafari
    Hosseinzadeh, Mehdi
    Sharifi, Arash
    Darwesh, Aso
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (08)
  • [4] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [5] Buyya Rajkumar, 2009, 2009 International Conference on High Performance Computing & Simulation (HPCS), P1, DOI 10.1109/HPCSIM.2009.5192685
  • [6] Crosby M., 2016, APPL INNOV REV, V2, P6
  • [7] Datta Pratish, 2016, Progress in Cryptology (AFRICACRYPT 2016). 8th International Conference in Cryptology. Proceedings: LNCS 9646, P325, DOI 10.1007/978-3-319-31517-1_17
  • [8] General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps
    Datta, Pratish
    Dutta, Ratna
    Mukhopadhyay, Sourav
    [J]. INFORMATION SECURITY, ISC 2015, 2015, 9290 : 336 - 354
  • [9] Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage
    Du, Minxin
    Wang, Qian
    He, Meiqi
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) : 2320 - 2332
  • [10] Proxy-assisted access control scheme of cloud data for smart cities
    Fan, Kai
    Wang, Junxiong
    Wang, Xin
    Yang, Yintang
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 937 - 947