Blockchain-based cloud storage system with CP-ABE-based access control and revocation process

被引:0
作者
Pratima Sharma
Rajni Jindal
Malaya Dutta Borah
机构
[1] Delhi Technological University,Department of Computer Science and Engineering
[2] National Institute of Technology,Department of Computer Science and Engineering
来源
The Journal of Supercomputing | 2022年 / 78卷
关键词
Blockchain; Cloud storage; CP-ABE; Access control; Revocation;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud system provides an on-demand and low-cost computing and storing model. Many organizations and individual end-users are using cloud storage services to back up their crucial data. However, this storage utility suffers from various threats and security issues. Before outsourcing the data to the cloud server, some data security measures should be imposed to ensure security. The blockchain is an advanced technology that stores data in a distributed manner and provides a more secure environment. Therefore, we propose a blockchain-based framework with the Ciphertext Policy Attribute-based Encryption algorithm to provide access control and user revocation methods in the cloud storage system to resolve the above issues. Our scheme offers three main features to provide a secure environment. First, a java-based blockchain network is designed to register data owners and attribute authority using a key generation algorithm. Second, the data owners and attribute authorities store the public information in the blockchain structure, set access policies, and generate the user’s secret key to resolve key escrow problems. Third, the immediate attribute modification is deployed to attain fine-grained access control with the user revocation process. The experimental results, analysis, and performance evaluation show that our scheme provides a feasible and reliable environment.
引用
收藏
页码:7700 / 7728
页数:28
相关论文
共 139 条
[1]  
Azhir E(2019)Query optimization mechanisms in the cloud environments: a systematic study Int J Commun Syst 32 e3940-115
[2]  
Navimipour NJ(2017)Cloud security issues and challenges: a survey J Netw Comput Appl 79 88-38
[3]  
Hosseinzadeh M(2017)A survey of secure data deduplication schemes for cloud storage systems ACM Comput Surv 49 1-2332
[4]  
Sharifi A(2018)Privacy-preserving indexing and query processing for secure dynamic cloud storage IEEE Trans Inf Forensics Secur 13 2320-61
[5]  
Darwesh A(2017)Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing Inf Sci 379 42-2145
[6]  
Singh A(2018)Security and privacy in smart health: Efficient policy-hiding attribute-based access control IEEE Internet of Things J 5 2130-141
[7]  
Chatterjee K(2017)Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms Comput Commun 111 120-115
[8]  
Shin Y(2017)Intelligent cryptography approach for secure distributed big data storage in cloud computing Inf Sci 387 103-123
[9]  
Koo D(2018)Cloud aided lightweight certificate less authentication protocol with anonymity for wireless body area networks J Netw Comput Appl 106 117-197
[10]  
Hur J(2018)Secure data uploading scheme for a smart home system Inf Sci 453 186-13