An efficient and revocable storage CP-ABE scheme in the cloud computing

被引:19
作者
Zhao, Yang [1 ]
Ren, Mao [1 ]
Jiang, Songquan [1 ]
Zhu, Guobin [1 ]
Xiong, Hu [1 ,2 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu 610054, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Coll & Univ Key Lab Cloud Comp & Complex, Guilin 541004, Peoples R China
基金
美国国家科学基金会;
关键词
CP-ABE; Constant-size ciphertexts; Constant-size secret keys; Outsourced decryption; Revocable storage; ATTRIBUTE-BASED ENCRYPTION; ACCESS-CONTROL; CIPHERTEXT; BROADCAST; KEYS;
D O I
10.1007/s00607-018-0637-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As a special kind of public-key encryption, attribute-based encryption (ABE) is able to achieve fine-grained access control mechanism by offering one-to-many encryption. Due to such unique characteristic, this primitive is widely employed in the cloud computing environment to provide flexible and secure data sharing. However, how to revoke the access privilege of a user to access encrypted data stored in cloud servers is challenging. Furthermore, the complex operation of ABE may cause a huge computational cost and is usually considered to be a heavy burden for system users. Motivated by the practical needs, an ABE scheme called efficient and revocable storage CP-ABE scheme with outsourced decryption and constant-size ciphertexts and secret keys is proposed in this paper. Our scheme offers the following features: Chinese remainder theorem is utilized to achieve revocable storage. In detail, third party severs are allowed to update ciphertexts stored on them so that those revoked users cannot decrypt any ciphertexts any more.To minimize local operations, the concept of outsourced ABE system with constant-size ciphertexts and secret keys are introduced. More specifically, decryptor is able to outsource most of computing work to the outsourcing service providers. In addition, the scheme is provably secure against selectively chosen-ciphertext attack. At the end, we describe how to deploy the scheme in cloud computing environment.
引用
收藏
页码:1041 / 1065
页数:25
相关论文
共 41 条
[1]  
[Anonymous], 2017, IEEE T DEPENDABLE SE
[2]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[3]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5921, P278, DOI 10.1007/978-3-642-10868-6_17
[4]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[7]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[8]  
Chia-Chi Teng, 2010, 2010 IEEE International Conference on Software Engineering and Service Sciences (ICSESS 2010), P431, DOI 10.1109/ICSESS.2010.5552343
[9]   Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption [J].
Doshi, Nishant ;
Jinwala, Devesh C. .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) :1988-2002
[10]  
Emura K, 2009, LECT NOTES COMPUT SC, V5451, P13, DOI 10.1007/978-3-642-00843-6_2