Computer Science ›› 2019, Vol. 46 ›› Issue (7): 114-119.doi: 10.11896/j.issn.1002-137X.2019.07.018

• Information Security • Previous Articles     Next Articles

Fully-outsourcing CP-ABE Scheme with Revocation in Cloud Computing

JIANG Ze-tao1,2,HUANG Jin1,HU Shuo3,XU Zhi1   

  1. (School of Computer and Information Security,Guilin University of Electronic Technology,Guilin,Guangxi 541004,China)1
    (Guangxi Key Laboratory of Trusted Software,Guilin University of Electronic Technology,Guilin,Guangxi 541004,China)2
    (School of Information Engineering,Nanchang Hangkong University,Nanchang 330063,China)3
  • Received:2018-06-07 Online:2019-07-15 Published:2019-07-15

Abstract: In the attribute-based encryption system (ABE),users can encrypt and decrypt information through their own attributes,which is flexible and secure.Therefore,the system is widely used in secure data sharing solutions for cloud storage.However,the standard ABE mechanism has a heavy computational overhead,it restricts the practical application of ABE encryption and can’t satisfy the requirement that the data owner can dynamically and efficiently modify the user access authority.Aiming at the above problems,this paper proposed a full-outsourcing ciphertext policy attribute-based encryption scheme supporting attribute revocation.By using computational outsourcing,the complex calculations of key generation and encryption and decryption processesare handed over to cloud server to complete,redu-cing computational overhead of the key generation center (KGC) and the user’s,and realizing the fine-grained revocation of user attributes through attribute key ciphertext updating.Finally,the efficiency and function of the proposed scheme were analyzed theoretically.Theoretical analysis was conducted to evaluate efficiency and functions of the proposed scheme.The results show that the proposed scheme has good security and high system efficiency.

Key words: Attribute base encryption, Attribute revocation, Cloud computing, Computing outsourcing, Key update

CLC Number: 

  • TP309
[1]WANG Y D,YANG J H,XU C,et al.Survey on access control technologies for cloud computing[J].Journal of Software,2015,26(5):1129-1150.(in Chinese)
王于丁,杨家海,徐聪,等.云计算访问控制技术研究综述[J].软件学报,2015,26(5):1129-1150.
[2]SHAMIR A.Identity-Based Cryptosystems and Signature Sche- mes[M]∥Advances in Cryptology.Springer Berlin Heidelberg,1984:47-53.
[3]SAHAI A,WATERS B.Fuzzy identity-based encryption[C]∥International Conference on Theory and Applications of Cryptographic Techniques.Springer-Verlag,2005:457-473.
[4]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥ACM Conference on Computer and Communications Security.ACM,2006:89-98.
[5]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-Policy Attribute-Based Encryption[C]∥IEEE Symposium on Security &Privacy.2007.
[6]GREEN M,HOHENBERGER S,WATERS B.Outsourcing the decryption of ABE ciphertexts[C]∥Usenix Conference on Security.USENIX Association,2011:34.
[7]ZHOU Z,HUANG D.Efficient and secure data storage operations for mobile cloud computing[C]∥International Conference on Network and Service Management.International Federation for Information Processing,2012:37-45.
[8]ASIM M M,PETKOVIC M M,IGNATENKO T T.Attribute-based encryption with encryption and decryption outsourcing[C]∥Conference on Innovations in Clouds,Internet and Networks.2014.
[9]CHOW S S M.A Framework of Multi-Authority Attribute- Based Encryption with Outsourcing and Revocation[C]∥ACM on Symposium on Access Control Models and Technologies.ACM,2016:215-226.
[10]MAO X,LAI J,MEI Q,et al.Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption[J].IEEE Transactions on Dependable & Secure Computing,2016,13(5):533-546.
[11]WANG H,HE D,SHEN J,et al.Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing[J].Soft Computing,2016,21(24):1-11.
[12]YU S,WANG C,REN K,et al.Achieving secure,scalable,and fine-grained data access control in cloud computing[C]∥INFOCOM,2010 Proceedings IEEE.IEEE,2010:1-9.
[13]YANG K,JIA X,REN K.Attribute-based fine-grained access control with efficient revocation in cloud storage systems[C]∥ACM Sigsac Symposium on Information,Computer and Communications Security.ACM,2013:523-528.
[14]HUR J,NOH D K.Attribute-Based Access Control with Effi- cient Revocation in Data Outsourcing Systems[J].IEEETran-sactions on Parallel & Distributed Systems,2011,22(7):1214-1221.
[15] LI Y,ZENG Z Y,ZHANG X F.Outsourced decryption scheme supporting attribute revocation[J].Journal of Tsinghua University(Science and Technology),2013,53(12):1664-1669.(in Chinese)
李勇,曾振宇,张晓菲.支持属性撤销的外包解密方案[J].清华大学学报(自然科学版),2013,53(12):1664-1669.
[16] MA H,BAI C C,LI B,et al.Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing[J].Journal of Xidian University,2015,42(6):6-10.(in Chinese)
马华,白翠翠,李宾,等.支持属性撤销和解密外包的属性基加密方案[J].西安电子科技大学学报,2015,42(6):6-10.
[17]FANG X F,WANG X M.Outsourced Encryption and Decryption CP-ABE Scheme with User Revocation [J].Computer Engineering,2016,42(12):124-128,132.(in Chinese)
方雪锋,王晓明.可撤销用户的外包加解密CP-ABE方案[J].计算机工程,2016,42(12):124-128,132.
[18]ZHANG P,CHEN Z,LIANG K,et al.A Cloud-Based Access Control Scheme with User Revocation and Attribute Update[C]∥Australasian Conference on Information Security and Privacy.Springer International Publishing,2016:525-540.
[19]LI J,JIA C,LI J,et al.Outsourcing encryption of attribute-based encryption with mapreduce[C]∥International Conference on Information and Communications Security.Springer-Verlag,2012:191-201.
[1] GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321.
[2] WANG Zheng, JIANG Chun-mao. Cloud Task Scheduling Algorithm Based on Three-way Decisions [J]. Computer Science, 2021, 48(6A): 420-426.
[3] PAN Rui-jie, WANG Gao-cai, HUANG Heng-yi. Attribute Access Control Based on Dynamic User Trust in Cloud Computing [J]. Computer Science, 2021, 48(5): 313-319.
[4] CHEN Yu-ping, LIU Bo, LIN Wei-wei, CHENG Hui-wen. Survey of Cloud-edge Collaboration [J]. Computer Science, 2021, 48(3): 259-268.
[5] JIANG Hui-min, JIANG Zhe-yuan. Reference Model and Development Methodology for Enterprise Cloud Service Architecture [J]. Computer Science, 2021, 48(2): 13-22.
[6] WANG Wen-juan, DU Xue-hui, REN Zhi-yu, SHAN Di-bin. Reconstruction of Cloud Platform Attack Scenario Based on Causal Knowledge and Temporal- Spatial Correlation [J]. Computer Science, 2021, 48(2): 317-323.
[7] XIANG A-xin, GAO Hong-feng, TIAN You-liang. Key Update Mechanism in Bitcoin Based on Improved P2PKHCA Script Scheme [J]. Computer Science, 2021, 48(11): 159-169.
[8] MAO Han-yu, NIE Tie-zheng, SHEN De-rong, YU Ge, XU Shi-cheng, HE Guang-yu. Survey on Key Techniques and Development of Blockchain as a Service Platform [J]. Computer Science, 2021, 48(11): 4-11.
[9] WANG Qin, WEI Li-fei, LIU Ji-hai, ZHANG Lei. Private Set Intersection Protocols Among Multi-party with Cloud Server Aided [J]. Computer Science, 2021, 48(10): 301-307.
[10] LEI Yang, JIANG Ying. Anomaly Judgment of Directly Associated Nodes Under Cloud Computing Environment [J]. Computer Science, 2021, 48(1): 295-300.
[11] XU Yun-qi, HUANG He, JIN Zhong. Application Research on Container Technology in Scientific Computing [J]. Computer Science, 2021, 48(1): 319-325.
[12] ZHNAG Kai-qi, TU Zhi-ying, CHU Dian-hui, LI Chun-shan. Survey on Service Resource Availability Forecast Based on Queuing Theory [J]. Computer Science, 2021, 48(1): 26-33.
[13] LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323.
[14] MA Xiao-xiao and HUANG Yan. Publicly Traceable Accountable Ciphertext Policy Attribute Based Encryption Scheme Supporting Large Universe [J]. Computer Science, 2020, 47(6A): 420-423.
[15] LIANG Jun-bin, ZHANG Min, JIANG Chan. Research Progress of Social Sensor Cloud Security [J]. Computer Science, 2020, 47(6): 276-283.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!