Ciphertext-Policy Attribute-Based Access Control with Effective User Revocation for Cloud Data Sharing System

Author(s):  
Nyamsuren Vaanchig ◽  
Wei Chen ◽  
Zhiguang Qin
2019 ◽  
Vol 62 (12) ◽  
pp. 1748-1760 ◽  
Author(s):  
Yang Chen ◽  
Wenmin Li ◽  
Fei Gao ◽  
Wei Yin ◽  
Kaitai Liang ◽  
...  

AbstractOnline data sharing has become a research hotspot while cloud computing is getting more and more popular. As a promising encryption technique to guarantee the security shared data and to realize flexible fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) has drawn wide attentions. However, there is a drawback preventing CP-ABE from being applied to cloud applications. In CP-ABE, the access structure is included in the ciphertext, and it may disclose user’s privacy. In this paper, we find a more efficient method to connect ABE with inner product encryption and adopt several techniques to ensure the expressiveness of access structure, the efficiency and security of our scheme. We are the first to present a secure, efficient fine-grained access control scheme with hidden access structure, the access structure can be expressed as AND-gates on multi-valued attributes with wildcard. We conceal the entire attribute instead of only its values in the access structure. Besides, our scheme has obvious advantages in efficiency compared with related schemes. Our scheme can make data sharing secure and efficient, which can be verified from the analysis of security and performance.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Xieyang Shen ◽  
Chuanhe Huang ◽  
Xiajiong Shen ◽  
Jiaoli Shi ◽  
Danxin Wang

With the ever-increasing demands on decentralization and transparency of cloud storage, CP-ABE (Ciphertext Policy-Attribute-Based Encryption) has become a promising technology for blockchain-enabled data sharing methods due to its flexibility. However, real-world blockchain applications usually have some special requirements like time restrictions or power limitations. Thus, decryption outsourcing is widely used in data sharing scenarios and also causes concerns about data security. In this paper, we proposed a secure access control scheme based on CP-ABE, which could share contents during a particular time slot in blockchain-enabled data sharing systems. Specifically, we bind the time period with both ciphertexts and the keys to archive the goal of only users who have the required attributes in a particular time slot can decrypt the content. Besides, we use time slots as a token to protect the data and access control scheme when users want to outsource the decryption phase. The security analysis shows that our scheme can provide collusion resistance ability under a time restriction, and performance evaluations indicate that our scheme uses less time in decryption compared to other schemes while ensuring security.


2015 ◽  
Vol 52 ◽  
pp. 95-108 ◽  
Author(s):  
Kaitai Liang ◽  
Man Ho Au ◽  
Joseph K. Liu ◽  
Willy Susilo ◽  
Duncan S. Wong ◽  
...  

Author(s):  
G. Arunajyothi

Cloud achieves not just diverse levels of accommodation and proficiency issues albeit persistently advancing in such manner, additionally extraordinary difficulties in the field of information assurance. SaaS based distributed computing stockpiling suppliers, for example, google, send space have been there for calm at some point with the security viewpoint continually being disregarded. So we propose a cloud construction modeling that addresses the security perspective as for encryption, access control and with respect to risk assessment, key controls, and monitoring and reporting execution sign. We additionally broaden it with data transmission estimation plan which is another key execution pointer of mists. Contrasted with before methodologies this plan has a lesser calculation overhead and is considered cutting edge because of usage of every conceivable execution parameter of cloud area.


Sign in / Sign up

Export Citation Format

Share Document