An efficient scheme to support direct revocation in cloud computing using CPABE: The approach with less time constraints

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Secure Data sharing is a major issue of concern in cloud computing. CPABE is well known encryption technique for dealing with the problem of data security over network. Most of the files have multilevel access hierarchy especially in health care and military domain. The hierarchy structure and revocation of shared files is not scrutinized in CP-ABE.  In this paper, experts proposed the enhanced method of encryption to support the direct revocation, in which sender specifies the revocation list during encryption of cipher text so that the problem of releasing periodic key update information in indirect revocation is vanished. Here the direct revocation mechanism and file access based hierarchy are merged to get enhanced CPABE. The multilevel access structure is integrated and merged with encrypted files with current access structure. Along with revocation, aim is also to improve the overall system performance with respect to encryption time and decryption time. Experimental result shows the enhanced performance of the proposed system as compared to existing system with respect to time and security constraints. Moreover the scheme is secure under the standard security assumption. Finally, based on the research, it gives forthcoming research direction to expand and implement the scheme in any practical application where security is main concern by proper coalition of the proposed technologies.

     

     


  • Keywords


    ABE; Access structure; CPABE; Cloud Computing; Cloud Security; File Hierarch; Revocation.

  • References


      [1] Hashizume et al.,”An analysis of security issues for cloudcomputing”, Journal of Internet Services and Applications, 2013.https://doi.org/10.1186/1869-0238-4-5.

      [2] J.Bethencourt, A. Sahai and B. Waters, Ciphertext-policy attribute based encryption, Proc. IEEE Symposium on Security and Privacy, pp. 321-334, 2007.https://doi.org/10.1109/SP.2007.11.

      [3] A. Sahai, B. Waters, Fuzzy identity based encryption, Proc. EUROCRYPT 2005, LNCS 3494, Springer, pp. 457473, 2005.https://doi.org/10.1007/11426639_27.

      [4] Jiguo Li, Yao Wang, Yichen Zhang and Jinguang Han, “Full Verifiability for Outsourced Decryption in Attribute Based Encryption”,February 2016, IEEE Transactions.

      [5] Chun-I Fan, Yi-Fan Tseng, and Chih-Wen Lin, “Attribute-Based Encryption from Identity-Based Encryption”, SEPTEMBER 2016, JOURNAL OF LATEX CLASS FILES.

      [6] “AnandTripathi and GowthamRajappan,”Scalable Transaction Management for Partially Replicated Data in Cloud Computing Environment”, 2016 IEEE 9th International Conference on Cloud Computing.

      [7] V. Goyal, O. Pandey, A. Sahai and B.Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proc. 13th ACM conference on Computer and Communications Security, pp. 89-98, 2006.

      [8] Yibin Li a,KekeGaib,LongfeiQiu, MeikangQiub,Hui Zhao d,“Intelligent cryptography approach for secure distributed big data storage in cloud computing”, 2016,ELSEVIER..

      [9] Cheng-Chi Lee, Pei-Shan Chung, and Min-Shiang Hwang, “A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments”, International Journal of Network Security, July 2013.

      [10] S.Mahdiet.al, “Challenges and security issues in Cloud computing from two perspectives: Data Security and Privacy Protection”, 2015, KBEI.

      [11] DimitroZissis,DimitosLekkas, ”Addressing CC security issues”,2010, ELSEVIER.

      [12] PalivelaHemant,NitinChawande,et al., ”Development of servers in CC to solve issues related to security and backup ”2011,IEEE.

      [13] VasilySidorov,WeeKeong Ng, ”Transparent Data Encryption for Data-in-Use and Data-at-Rest in a Cloud-Based Database-as-a-Service Solution”, 2015, IEEE.

      [14] G Wang et al,Hierarchical ABE for fine grained access control in cloud storage services,17th ACM conference on computer and communication security ,2010.

      [15] Dong,Wang, ”Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm”,2015,IEEE transactions on cloud.

      [16] Hui Yin,ZhengQin,et,al., ”Achieving secure ,universal,fine grained query results verification for secure search scheme over encrypted cloud data ”,2016,IEEE transactions on cloud.

      [17] Naeem Ahmed, ”Cloud Computing: Technology, Security Issues and Solutions”,2017,IEEE

      [18] Jiang Schuci,GuoWeibin et al,”Hierarchy Attribute -Based Encryption scheme to support direct revocation in cloud storage”,2017,IEEE.

      [19] Cheng-Chi Lee et al, “A survey on attribute based encryption schemes of access control in cloud environment”, July 2013, International journal of network security.

      [20] HuilingQianJiguoLiYichenZhang,et al., ”Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure”,2013,International Conference on Information and Communications Security.

      [21] SuhairAlshehri, Stanisaw P. Radziszowski, and Rajendra K. Ra “Secure Access for Healthcare Data in the Cloud Using Ciphertext-Policy Attribute-Based Encryption”, 2012 IEEE 28th International Conference on Data Engineering Workshops.https://doi.org/10.1109/ICDEW.2012.68.

      [22] Cheng Guo1,2 Ruhan Zhuang1,2,Yingmo Jie1, Yizhi Ren, Ting Wu, “Kim-Kwang Raymond Choo,”Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds”,2016 Cross- Mark

      [23] M. Green, S. Hohenberger, and B. Waters, “Outsourcing the decryption of ABE ciphertexts, Proc. The Usenix Security Symposium, pp. 34-34, 2011.

      [24] J. Lai, R. Deng, C. Guan, and J. Weng, “Attribute-based encryption with verifiable outsourced decryption”, IEEE Trans. Information Forensics and Security, vol. 8, no. 8, pp. 1343-1354, 2013, https://doi.org/10.1109/TIFS.2013.2271848.

      [25] B. Qin, R.H. Deng, S. Liu and S. Ma, “Attribute-based encryption with efficient verifiable outsourced decryption”, IEEE Trans. Information Forensics and Security, vol. 10, no. 7, pp. 1384-1393, 2015, https://doi.org/10.1109/TIFS.2015.2410137.

      [26] X. Mao, J. Lai, Q. Mei, K. Chen and J. Weng, Generic and efficient Constructions of attribute-based encryption with verifiable outsourced decryption, IEEE Trans. Dependable and Secure Computing, 2015, https://doi.org/10.1109/TDSC.2015.2423669.

      [27] Edonardo Gaetani et al [27], Blockchain based database to ensure data integrity in cloud environments.

      [28] Chun-I Fan Attribute Based Encryption from Identity Based encryption, Journal of LATEX class files,September 2016.

      [29] Matthew Green,Brnt Waters ,Susan Hohenberger, Outsourcing the decryption of ABE cipher texts,Proc. The usenix security symposium, pp.34-34, 2011.

      [30] William Stallings Cryptography and Network Security Principles and Practices, Fourth Edition.


 

View

Download

Article ID: 14636
 
DOI: 10.14419/ijet.v7i3.14636




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.