Hierarchical Access Structure-based Scheme with Outsourcing and Revocation Mechanism for Cloud Environment

Authors

DOI:

https://doi.org/10.26636/jtit.2023.4.1299

Keywords:

attribute revocation, cloud computing, hierarchical access control, outsourced decryption, trust

Abstract

Ciphertext policy attribute-based encryption (CPABE) is one of the efficient implementations of encrypted access control scheme for cloud computing. Though multiple implementations of CPABE exist, there are some issues that need to be addressed, including efficient revocation approach, decryption time, storage cost etc. In this paper, an efficient scheme that incorporates a hierarchical access structure, outsourced decryption, as well as user and attribute revocation is presented. The hierarchical access structure is utilized to encrypt multiple data using one common access structure and makes the encryption process more efficient. The outsourcing server is used to perform partial decryption, so that all heavy computations are performed by this server and less overhead is incurred by the data user. The proposed framework also integrates the evaluation of trustworthiness of data users and service providers to ensure trusted and encrypted access control procedures. The paper also presents an analysis of the time required for performing different operations. Simulation results show that the proposed scheme outperforms the existing approaches.

Downloads

Download data is not yet available.

References

A. Sahai and B. Waters, "Fuzzy Identity Based Encryption", in: Advances in Cryptology - EUROCRYPT 2005, vol. 3494, pp. 457-473, 2005. DOI: https://doi.org/10.1007/11426639_27

J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext Policy Attribute based Encryption", IEEE Symposium on Security and Privacy, Berkeley, USA, pp. 321-334, 2007. DOI: https://doi.org/10.1109/SP.2007.11

V. Goyal V, O. Pandey, A. Sahai, and B. Waters, "Attribute Based Encryption for Fine-Grained Access Conrol of Encrypted Data", Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, pp. 89-98, 2006. DOI: https://doi.org/10.1145/1180405.1180418

Y. Yang, J. Sun, Z. Liu, and Y. Qiao, "Practical Revocable and Multi-authority CP-ABE Scheme from RLWE for Cloud Computing", Journal of Information Security and Applications, vol. 65, no. 6, art. no. 103108, 2022. DOI: https://doi.org/10.1016/j.jisa.2022.103108

Z. Zhang, W. Zhang, and Z. Qin, "A Partially Hidden Policy CP-ABE Scheme Against Attribute Values Guessing Attacks with Online Privacy-protective Decryption Testing in IoT Assisted Cloud Computing", Future Generation Computer Systems, vol. 123, pp. 181-195, 2021. DOI: https://doi.org/10.1016/j.future.2021.04.022

H. Zhong, Y. Zhou, Q. Zhang, Y. Xu, and J. Cui, "An Efficient and Outsourcing-supported Attribute-based Access Control Scheme for Edge-enabled Smart Healthcare", Future Generation Computer Systems, vol. 115, pp. 486-496, 2021. DOI: https://doi.org/10.1016/j.future.2020.09.021

M. Mandal, "Privacy-preserving Fully Anonymous Ciphertext Policy Attribute-based Broadcast Encryption with Constant-size Secret Keys and Fast Decryption", Journal of Information Security and Applications, vol. 55, art. no. 102666, 2020. DOI: https://doi.org/10.1016/j.jisa.2020.102666

S. Wang, S. Jia, and Y. Zhang, "Verifiable and Multi-keyword Searchable Attribute-based Encryption Scheme for Cloud Storage", IEEE Access, vol. 7, pp. 50136-50147, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2910828

Y. He et al., "An Efficient Ciphertext-policy Attribute-based Encryption Scheme Supporting Collaborative Decryption With Blockchain", IEEE Internet of Things Journal, vol. 9, no. 4, pp. 2722-2733, 2022. DOI: https://doi.org/10.1109/JIOT.2021.3099171

K. Yang et al., "Attribute Based Encryption with Efficient Revocation from Lattices", International Journal of Network Security, vol. 22, no.1, pp. 161-170, 2020.

J. Li et al., "An Efficient Attribute-based Encryption Scheme With Policy Update and File Update in Cloud Computing", IEEE Transactions on Industrial Informatics, vol. 15, no. 12, pp. 6500-6509, 2019. DOI: https://doi.org/10.1109/TII.2019.2931156

S. Tu, M. Waqas, F. Huang, G. Abbas, and Z.H. Abbas, "A Revocable and Outsourced Multi-authority Attribute-based Encryption Scheme in Fog Computing", Computer Networks, vol. 195, art. no. 108196, 2021. DOI: https://doi.org/10.1016/j.comnet.2021.108196

W. Wang, Z. Wang, B. Li, Q. Dong, and D. Huang, "IR-CP-ABE: Identity Revocable Ciphertext-policy Attribute-based Encryption for Flexible Secure Group-based Communication", IACR Cryptology ePrint Archive, vol. 1100, pp. 1-14, 2017 (https://ia.cr/2017/1100).

D. Han, N. Pan, and K.-C. Li, "A Traceable and Revocable Ciphertext-policy Attribute-based Encryption Scheme Based on Privacy Protection", IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 1, pp. 316-327, 2020. DOI: https://doi.org/10.1109/TDSC.2020.2977646

Z. Liu, F. Wang, K. Chen, and F. Tang, "A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update", Security and Communication Networks, vol. 2020, art. no. 8856592, 2020. DOI: https://doi.org/10.1155/2020/8856592

Z. Li et al., "An Efficient ABE Scheme with Verifiable Outsourced Encryption and Decryption", IEEE Access, vol. 7, pp. 29023-29037, 2019. DOI: https://doi.org/10.1109/ACCESS.2018.2890565

J. Yu, G. He , X. Yan, Y. Tang, and R. Qin, "Outsourced Ciphertext-policy Attribute-based Encryption with Partial Policy Hidden", International Journal of Distributed Sensor Networks, vol. 16, no. 5, 2020. DOI: https://doi.org/10.1177/1550147720926368

J. Li, Y. Zhang, X. Chen, and Y. Xiang, "Secure Attribute-based Data Sharing for Resource-limited Users in Cloud Computing", Computers and Security, vol. 72, pp. 1-12, 2018. DOI: https://doi.org/10.1016/j.cose.2017.08.007

K. Fan, J. Wang, X. Wang, H. Li, and Y. Yang, "A Secure and Verifiable Outsourced Access Control Scheme in Fog-cloud Computing", Sensors, vol. 17, no. 7, pp. 1695-1710, 2017. DOI: https://doi.org/10.3390/s17071695

R. Zhang, H. Ma, and Y. Lu, "Fine-grained Access Control System Based on Fully Outsourced Attribute-based Encryption", Journal of Systems and Software, vol. 125, no. 3, pp. 344-353, 2017. DOI: https://doi.org/10.1016/j.jss.2016.12.018

J. Zhao, P. Zeng, and K.-K.R. Choo, "An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health", IEEE Access, vol. 9, pp. 13789-13799, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3052247

T.N. Mujawar and L.B. Bhajantri, "Efficient Direct and Immediate User Revocable Attribute based Encryption Scheme", in: Proceedings of 5th International Conference on Intelligent Sustainable System (ICISS 2022), Tirunelveli, India, 2022 (https://link.springer.com/chapter/10.1007/978-981-19-2894-9_38). DOI: https://doi.org/10.1007/978-981-19-2894-9_38

T.N. Mujawar and L.B. Bhajantri, "The Trusted Hierarchical Access Structure-Based Encryption Scheme for Cloud Computing", International Journal of Cloud Applications and Computing, vol. 12, no. 1, pp. 1-17, 2022. DOI: https://doi.org/10.4018/IJCAC.308273

T.N. Mujawar and L.B. Bhajantri, "Behavior and Feedback Based Trust Computation in Cloud Environment", Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 8, pp. 4956-4967, 2022. DOI: https://doi.org/10.1016/j.jksuci.2020.12.003

A. Lewko and B. Waters, "Decentralizing Attribute-based Encryption", in: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, 2011. DOI: https://doi.org/10.1007/978-3-642-20465-4_31

A. De Caro and V. Iovino, "jPBC: Java Pairing Based Cryptography", in: 2011 IEEE Symposium on Computers and Communications, Kerkyra, Greece, 2011. DOI: https://doi.org/10.1109/ISCC.2011.5983948

Downloads

Published

2023-11-28

How to Cite

Mujawar, T. N., Bhajantri, L. B., & Sutagundar, A. V. (2023). Hierarchical Access Structure-based Scheme with Outsourcing and Revocation Mechanism for Cloud Environment. Journal of Telecommunications and Information Technology, 4(4), 83–92. https://doi.org/10.26636/jtit.2023.4.1299

Issue

Section

ARTICLES FROM THIS ISSUE

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.