A Cloud-Based Access Control Scheme with User Revocation and Attribute Update

被引:26
|
作者
Zhang, Peng [1 ]
Chen, Zehong [1 ]
Liang, Kaitai [2 ]
Wang, Shulan [1 ]
Wang, Ting [1 ,3 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, ATR Key Lab Natl Def Technol, Shenzhen, Peoples R China
[2] Aalto Univ, Dept Comp Sci, Espoo, Finland
[3] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou, Guangdong, Peoples R China
来源
关键词
Cloud; Access control; Attribute-based encryption; User revocability; Attribute update; CIPHERTEXT DELEGATION; ENCRYPTION;
D O I
10.1007/978-3-319-40253-6_32
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) is a well-known cryptographic technology for guaranteeing data confidentiality but also fine-grained data access control. It enables data owners to define flexible access policy for cloud-based data sharing. However, the user revocation and attribute update problems existing in CP-ABE systems that are long-standing unsolved in the literature. In this paper, we propose the first access control (CP-ABE) scheme supporting user revocability and attribute update. Specifically, the user revocation is defined in the identity-based setting that does not conflict our attribute-based design. The cost brought by attribute update is efficient in the sense that we only concentrate on the update of the ciphertexts associated with the corresponding updated attribute. Moreover, the security analysis shows that the proposed scheme is secure under the decisional Bilinear DiffieHellman assumption.
引用
收藏
页码:525 / 540
页数:16
相关论文
共 50 条
  • [31] Attribute-based bilateral access control scheme for cloud storage
    Li Q.
    Fan H.
    Chen W.
    Xiong J.
    Han L.
    Li R.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (04): : 128 - 136
  • [32] A scheme supporting efficient attribute revocation for cloud storage based on CPABE
    Cai, Bodong
    Xiong, LiaoTe
    Ye, Junyan
    Ma, Meng
    Tang, Zhuo
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 736 - 740
  • [33] Secure Cloud EHR with Semantic Access Control, Searchable Encryption and Attribute Revocation
    Walid, Redwan
    Joshi, Karuna P.
    Choi, Seung Geol
    2021 IEEE INTERNATIONAL CONFERENCE ON DIGITAL HEALTH (ICDH 2021), 2021, : 38 - 47
  • [34] Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage
    Wang, Shangping
    Zhang, Xiaoxue
    Zhang, Yaling
    PLOS ONE, 2016, 11 (11):
  • [35] Generic user revocation systems for attribute-based encryption in cloud storage
    Chen, Genlang
    Xu, Zhiqian
    Jiang, Hai
    Li, Kuan-ching
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (11) : 1362 - 1384
  • [36] Generic user revocation systems for attribute-based encryption in cloud storage
    Genlang Chen
    Zhiqian Xu
    Hai Jiang
    Kuan-ching Li
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 1362 - 1384
  • [37] Generic user revocation systems for attribute-based encryption in cloud storage
    Genlang CHEN
    Zhiqian XU
    Hai JIANG
    Kuan-ching LI
    FrontiersofInformationTechnology&ElectronicEngineering, 2018, 19 (11) : 1362 - 1384
  • [38] Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage
    Liu, Hongwei
    Zhu, Ping
    Chen, Zehong
    Zhang, Peng
    Jiang, Zoe L.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 556 - 561
  • [39] Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
    Zarezadeh, Maryam
    Taluki, Maede Ashouri
    Siavashi, Mohammad
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (02): : 129 - 140
  • [40] Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing
    Xu, Zhiqian
    Martin, Keith M.
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 358 - 365