基于云的增强cabe框架,用于有效的用户和属性级撤销

Shobha Chawla, N. Gupta
{"title":"基于云的增强cabe框架,用于有效的用户和属性级撤销","authors":"Shobha Chawla, N. Gupta","doi":"10.1080/1206212X.2023.2250149","DOIUrl":null,"url":null,"abstract":"Outsourcing massive amounts of data to the cloud service provider (CSP) has raised various security concerns for data confidentiality and access control. The ciphertext policy attribute based encryption (CPABE) scheme allows data owners to impose access control on their cloud-resident sensitive data. This paper has studied the approaches adopted to revoke users by the existing bilinear pairing cryptography based CPABE schemes. The existing studies have suggested solutions to revocation either by updating the non-revoked users’ keys or updating the ciphertext. Such approaches increase computational overhead for resource-constrained devices. In addition, a few studies have discussed the possibility of the CSP becoming dishonest and colluding with the revoked users. The likelihood of a collusion attack caused by the CSP and the revoked users also needs extensive attention. The development of the proposed proxy-based framework aims to extend the existing CPABE scheme and simplify the revocation of access rights at the user and attribute level with scalability, dynamicity, collusion resistance, and forward/backward secrecy. The proposed framework uses bilinear pairing cryptography and LSSS as an access structure. Furthermore, the security and performance analysis of the proposed framework reflects that it is implementable, better, and more secure than the existing work.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"42 1","pages":"523 - 533"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A cloud based enhanced CPABE framework for efficient user and attribute-level revocation\",\"authors\":\"Shobha Chawla, N. Gupta\",\"doi\":\"10.1080/1206212X.2023.2250149\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Outsourcing massive amounts of data to the cloud service provider (CSP) has raised various security concerns for data confidentiality and access control. The ciphertext policy attribute based encryption (CPABE) scheme allows data owners to impose access control on their cloud-resident sensitive data. This paper has studied the approaches adopted to revoke users by the existing bilinear pairing cryptography based CPABE schemes. The existing studies have suggested solutions to revocation either by updating the non-revoked users’ keys or updating the ciphertext. Such approaches increase computational overhead for resource-constrained devices. In addition, a few studies have discussed the possibility of the CSP becoming dishonest and colluding with the revoked users. The likelihood of a collusion attack caused by the CSP and the revoked users also needs extensive attention. The development of the proposed proxy-based framework aims to extend the existing CPABE scheme and simplify the revocation of access rights at the user and attribute level with scalability, dynamicity, collusion resistance, and forward/backward secrecy. The proposed framework uses bilinear pairing cryptography and LSSS as an access structure. Furthermore, the security and performance analysis of the proposed framework reflects that it is implementable, better, and more secure than the existing work.\",\"PeriodicalId\":39673,\"journal\":{\"name\":\"International Journal of Computers and Applications\",\"volume\":\"42 1\",\"pages\":\"523 - 533\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computers and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/1206212X.2023.2250149\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computers and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/1206212X.2023.2250149","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

摘要

将大量数据外包给云服务提供商(CSP)引发了数据机密性和访问控制方面的各种安全问题。基于密文策略属性的加密(cabe)方案允许数据所有者对其驻留在云中的敏感数据施加访问控制。本文研究了现有的基于双线性配对密码的cabe方案撤销用户的方法。现有的研究建议通过更新未被撤销用户的密钥或更新密文来解决撤销问题。这种方法增加了资源受限设备的计算开销。此外,一些研究讨论了CSP变得不诚实并与被撤销用户勾结的可能性。CSP与被撤销用户之间发生串通攻击的可能性也需要引起广泛关注。所提出的基于代理的框架的开发旨在扩展现有的cpab方案,并通过可扩展性、动态性、抗合谋性和前向/后向保密性简化用户和属性级别的访问权限撤销。该框架采用双线性配对加密和LSSS作为访问结构。此外,提出的框架的安全性和性能分析表明,它比现有的工作更好、更安全、可实现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A cloud based enhanced CPABE framework for efficient user and attribute-level revocation
Outsourcing massive amounts of data to the cloud service provider (CSP) has raised various security concerns for data confidentiality and access control. The ciphertext policy attribute based encryption (CPABE) scheme allows data owners to impose access control on their cloud-resident sensitive data. This paper has studied the approaches adopted to revoke users by the existing bilinear pairing cryptography based CPABE schemes. The existing studies have suggested solutions to revocation either by updating the non-revoked users’ keys or updating the ciphertext. Such approaches increase computational overhead for resource-constrained devices. In addition, a few studies have discussed the possibility of the CSP becoming dishonest and colluding with the revoked users. The likelihood of a collusion attack caused by the CSP and the revoked users also needs extensive attention. The development of the proposed proxy-based framework aims to extend the existing CPABE scheme and simplify the revocation of access rights at the user and attribute level with scalability, dynamicity, collusion resistance, and forward/backward secrecy. The proposed framework uses bilinear pairing cryptography and LSSS as an access structure. Furthermore, the security and performance analysis of the proposed framework reflects that it is implementable, better, and more secure than the existing work.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Computers and Applications
International Journal of Computers and Applications Computer Science-Computer Graphics and Computer-Aided Design
CiteScore
4.70
自引率
0.00%
发文量
20
期刊介绍: The International Journal of Computers and Applications (IJCA) is a unique platform for publishing novel ideas, research outcomes and fundamental advances in all aspects of Computer Science, Computer Engineering, and Computer Applications. This is a peer-reviewed international journal with a vision to provide the academic and industrial community a platform for presenting original research ideas and applications. IJCA welcomes four special types of papers in addition to the regular research papers within its scope: (a) Papers for which all results could be easily reproducible. For such papers, the authors will be asked to upload "instructions for reproduction'''', possibly with the source codes or stable URLs (from where the codes could be downloaded). (b) Papers with negative results. For such papers, the experimental setting and negative results must be presented in detail. Also, why the negative results are important for the research community must be explained clearly. The rationale behind this kind of paper is that this would help researchers choose the correct approaches to solve problems and avoid the (already worked out) failed approaches. (c) Detailed report, case study and literature review articles about innovative software / hardware, new technology, high impact computer applications and future development with sufficient background and subject coverage. (d) Special issue papers focussing on a particular theme with significant importance or papers selected from a relevant conference with sufficient improvement and new material to differentiate from the papers published in a conference proceedings.
期刊最新文献
Weight assignment in cloud service selection based on FAHP and rough sets The social force model: a behavioral modeling approach for information propagation during significant events A comprehensive study on social networks analysis and mining to detect opinion leaders A machine learning approach for skin lesion classification on iOS: implementing and optimizing a convolutional transfer learning model with Create ML Physical-layer security for primary users in 5G underlay cognitive radio system via artificial-noise-aided by secondary users
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1