Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control
Title | Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Imine, Y., Lounis, A., Bouabdallah, A. |
Conference Name | 2017 IEEE Trustcom/BigDataSE/ICESS |
Date Published | Aug. 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5090-4906-6 |
Keywords | Access Control, attribute revocation, attribute-based encryption, Authorization, cloud computing, cloud environment, Companies, Computer architecture, cryptographic method, cryptography, data confidentiality, decentralized attribute-based encryption access control, decentralized CP-ABE, Encryption, flexible access policies, group sharing applications, Multi-authority, multi-authority architecture, pubcrawl, revocation, Scalability, security degradations, security scalability, software architecture |
Abstract | Access control is one of the most challenging issues in Cloud environment, it must ensure data confidentiality through enforced and flexible access policies. The revocation is an important task of the access control process, generally it consists on banishing some roles from the users. Attribute-based encryption is a promising cryptographic method which provides the fine-grained access, which makes it very useful in case of group sharing applications. This solution has initially been developed on a central authority model. Later, it has been extended to a multi-authority model which is more convenient and more reliable. However, the revocation problem is still the major challenge of this approach. There have been few proposed revocation solutions for the Multi-authority scheme and these solutions suffer from the lack of efficiency. In this paper, we propose an access control mechanism on a multi-authority architecture with an immediate and efficient attributes' or users' revocation. The proposed scheme uses decentralized CP-ABE to provide flexible and fine-grained access. Our solution provides collusion resistance, prevents security degradations, supports scalability and does not require keys' redistribution. |
URL | https://ieeexplore.ieee.org/document/8029420?reload=true |
DOI | 10.1109/Trustcom/BigDataSE/ICESS.2017.217 |
Citation Key | imine_immediate_2017 |
- decentralized CP-ABE
- Software Architecture
- security scalability
- security degradations
- Scalability
- revocation
- pubcrawl
- multi-authority architecture
- Multi-authority
- group sharing applications
- flexible access policies
- encryption
- Access Control
- decentralized attribute-based encryption access control
- data confidentiality
- Cryptography
- cryptographic method
- computer architecture
- Companies
- cloud environment
- Cloud Computing
- authorization
- attribute-based encryption
- attribute revocation