HUANG Qinlong, MA Zhaofeng, YANG Yixian, et al., “EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing,” Chinese Journal of Electronics, vol. 24, no. 4, pp. 862-868, 2015, doi: 10.1049/cje.2015.10.033
Citation: HUANG Qinlong, MA Zhaofeng, YANG Yixian, et al., “EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing,” Chinese Journal of Electronics, vol. 24, no. 4, pp. 862-868, 2015, doi: 10.1049/cje.2015.10.033

EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing

doi: 10.1049/cje.2015.10.033
Funds:  This work is supported by the National Natural Science Foundation of China (No.61272519, No.61121061).
  • Received Date: 2013-11-25
  • Rev Recd Date: 2014-04-05
  • Publish Date: 2015-10-10
  • Ciphertext-policy attribute-based encryption (CP-ABE) is becoming a promising solution to guarantee data security in cloud computing. In this paper, we present an attribute-based secure data sharing scheme with Efficient revocation (EABDS) in cloud computing. Our scheme first encrypts data with Data encryption key (DEK) using symmetric encryption and then encrypts DEK based on CP-ABE, which guarantees the data confidentiality and achieves fine-grained access control. In order to solve the key escrow problem in current attribute based data sharing schemes, our scheme adopts additively homomorphic encryption to generate attribute secret keys of users by attribute authority in cooperation with key server, which prevents attribute authority from accessing the data by generating attribute secret keys alone. Our scheme presents an immediate attribute revocation method that achieves both forward and backward security. The computation overhead of user is also reduced by delegating most of the decryption operations to the key server. The security and performance analysis results show that our scheme is more secure and efficient.
  • loading
  • Q. Huang, Z. Ma, J. Fu, X. Niu and Y. Yang, "Attribute based DRM scheme with efficient revocation in cloud computing", Journal of Computers, Vol.8, No.11, pp.2776-2781, 2013.
    J. Lai, R.H. Deng, C. Guan and J. Weng, "Attribute-based encryption with verifiable outsourced decryption", IEEE Transactions on Information Forensics and Security, Vol.8, No.8, pp.1343-1354, 2013.
    J. Hur, D. Koo, S.O. Hwang and K. Kang, "Removing escrow from ciphertext policy attribute-based encryption", Computers & Mathematics with Applications, Vol.65, No.9, pp.1310-1317, 2013.
    M. Li, S. Yu, Y. Zheng, K. Ren and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption", IEEE Transactions on Parallel and Distributed Systems, Vol.24, No.1, pp.131-143, 2013.
    J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute based encryption", Proceedings of 2007 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp.321-334, 2007.
    G. Wang, Q. Liu, J. Wu and M. Guo, "Hierarchical attributebased encryption and scalable user revocation for sharing data in cloud servers", Computers and Security, Vol.30, No.5, pp.320-331, 2011.
    Z. Wan, J. Liu and R.H. Deng, "HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing", IEEE Transactions on Information Forensics and Security, Vol.7, No.2, pp.743-754, 2012.
    J. Hur, "Attribute-based secure data sharing with hidden policies in smart grid", IEEE Transactions on Parallel and Distributed Systems, Vol.24, No.11, pp.2171-2180, 2013.
    M. Chase and S.S. Chow, "Improving privacy and security in multi-authority attribute-based encryption", Proceedings of the 16th ACM conference on Computer and Communications Security, Chicago, IL, USA, pp.121-130, 2009.
    M. Yang, F. Liu, J. Han and Z. Wang, "An efficient attribute based encryption scheme with revocation for outsourced data sharing control", Proceedings of 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control, Beijing, China, pp.516-520, 2011.
    J. Hur, "Improving security and efficiency in attribute-based data sharing", IEEE Transactions on Knowledge and Data Engineering, Vol.25, No.10, pp.2271-2282, 2013.
    S. Yu, C. Wang, K. Ren and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing", Proceedings of IEEE INFOCOM 2010, San Diego, CA, USA, pp.1-9, 2010.
    K. Yang, X. Jia, K. Ren and B. Zhang, "DAC-MACS: Effective data access control for multi-authority cloud storage systems", Proceedings of IEEE INFOCOM 2013, Turin, Italy, pp.2895- 2903, 2013.
    J. Hur and D. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems", IEEE Transactions on Parallel and Distributed Systems, Vol.22, No.7, pp.1214-1221, 2011.
    X. Yi, M.G. Kaosar, R. Paulet and E. Bertino, "Single-database private information retrieval from fully homomorphic encryption", IEEE Transactions on Knowledge and Data Engineering, Vol.25, No.5, pp.1125-1134, 2013.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (582) PDF downloads(1562) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return