• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Guangbo, Liu Haitao, Wang Chenlu, Wang Pengcheng, Lian Lin, Hui Wentao. Revocable Attribute Based Encryption in Cloud Storage[J]. Journal of Computer Research and Development, 2018, 55(6): 1190-1200. DOI: 10.7544/issn1000-1239.2018.20170063
Citation: Wang Guangbo, Liu Haitao, Wang Chenlu, Wang Pengcheng, Lian Lin, Hui Wentao. Revocable Attribute Based Encryption in Cloud Storage[J]. Journal of Computer Research and Development, 2018, 55(6): 1190-1200. DOI: 10.7544/issn1000-1239.2018.20170063

Revocable Attribute Based Encryption in Cloud Storage

More Information
  • Published Date: May 31, 2018
  • Attribute-based encryption (ABE) scheme which can achieve fine-grained access control is more and more widely used in cloud storage. However, it is an important challenge to solve dynamic user and attribute revocation in the original scheme. In order to solve this problem, this paper proposes a ciphertext-policy ABE (CP-ABE) scheme which can achieve attribute level user attribution, namely if an attribute of some user is revoked, it cannot influence the common access of other legitimate attributes. If an attribute is revoked, the ciphertext corresponding to this attribute should be updated based on the designed broadcast attribute-based encryption scheme so that only the persons whose attributes meet the access strategy and have not been revoked will be able to carry out the key updating and decrypt the ciphertext successfully. Our scheme is proved secure based on the q-Parallel Bilinear Diffie-Hellman Exponent assumption in the standard model, therefore, it has stronger security. In addition, the relative operations associated with the attributes revocation are migrated to the cloud storage provider (CSP) to implement, which reduces the computational load of attribute authority (AA) greatly. Finally, the performance analysis and experimental verification are carried out in this paper, and the experimental results show that, compared with the existing revocation schemes, although our scheme increases the computational load of CSP for achieving the attribute revocation, it does not need the participation of AA, which reduces the computational load of AA. In addition, the user does not need any additional parameters to achieve the attribute revocation except of the private key, thus saving the storage space greatly.
  • Related Articles

    [1]Su Mang, Li Fenghua, Shi Guozhen. Action-Based Multi-level Access Control Model[J]. Journal of Computer Research and Development, 2014, 51(7): 1604-1613.
    [2]Lei Lingguang, Jing Jiwu, Wang Yuewu, Zhang Zhongwen. A Behavior-Based System Resources Access Control Scheme for Android[J]. Journal of Computer Research and Development, 2014, 51(5): 1028-1038.
    [3]Cheng Fangquan, Peng Zhiyong, Song Wei, Wang Shulin, Cui Yihui. Key Management for Access Control in Trusted Cloud Storages[J]. Journal of Computer Research and Development, 2013, 50(8): 1613-1627.
    [4]Liu Wu, Duan Haixin, Zhang Hong, Ren Ping, Wu Jianping. TRBAC: Trust Based Access Control Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1414-1420.
    [5]Wu Xinsong, He Yeping, Zhou Zhouyi, Liang Hongliang. An Environment-Adaptive Role-Based Access Control Model[J]. Journal of Computer Research and Development, 2011, 48(6): 983-990.
    [6]Nie Xiaowei, Feng Dengguo. TXACML—An Access Control Policy Framework Based on Trusted Platform[J]. Journal of Computer Research and Development, 2008, 45(10): 1676-1686.
    [7]Chen Ying, Yang Shoubao, Guo Leitao, and Shen Kai. A Dynamic Access Control Scheme Across Multi-Domains in Grid Environment[J]. Journal of Computer Research and Development, 2006, 43(11): 1863-1869.
    [8]Xu Zhen, Li Lan, Feng Dengguo. An Access Control Model for DBMS Based on Dynamic Context Stack[J]. Journal of Computer Research and Development, 2005, 42(12): 2093-2099.
    [9]Zhang Yu, Zhang Wenyi, Li Xianxian, and Huai Jinpeng. Secure Access Control for Group Communication on Multi-Autonomous Domains Collaborative Environment[J]. Journal of Computer Research and Development, 2005, 42(9): 1558-1563.
    [10]Long Qin, Liu Peng, Pan Aimin. Research and Implementation of an Extended Administrative Role-Based Access Control Model[J]. Journal of Computer Research and Development, 2005, 42(5): 868-876.
  • Cited by

    Periodical cited type(4)

    1. 刘艳君,牛丽平. 采用改进积分反演法的四旋翼无人机容错控制. 计算机应用与软件. 2022(06): 70-75+95 .
    2. 宋伟中,王行业,王宁. 一种面向无人机区域协同覆盖的感知任务分配方法. 计算机应用与软件. 2021(05): 75-81 .
    3. 马昊鹏,刘由之,李荣军,阎华,杨卫民. 无人机航母系统的构建与应用. 科技创新与应用. 2020(01): 37-40+43 .
    4. 李鹏举,毛鹏军,耿乾,黄传鹏,方骞,张家瑞. 无人机集群技术研究现状与趋势. 航空兵器. 2020(04): 25-32 .

    Other cited types(4)

Catalog

    Article views (1507) PDF downloads (639) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return