Visible to the public Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control

TitleImmediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control
Publication TypeConference Paper
Year of Publication2017
AuthorsImine, Y., Lounis, A., Bouabdallah, A.
Conference Name2017 IEEE Trustcom/BigDataSE/ICESS
Date PublishedAug. 2017
PublisherIEEE
ISBN Number978-1-5090-4906-6
KeywordsAccess Control, attribute revocation, attribute-based encryption, Authorization, cloud computing, cloud environment, Companies, Computer architecture, cryptographic method, cryptography, data confidentiality, decentralized attribute-based encryption access control, decentralized CP-ABE, Encryption, flexible access policies, group sharing applications, Multi-authority, multi-authority architecture, pubcrawl, revocation, Scalability, security degradations, security scalability, software architecture
Abstract

Access control is one of the most challenging issues in Cloud environment, it must ensure data confidentiality through enforced and flexible access policies. The revocation is an important task of the access control process, generally it consists on banishing some roles from the users. Attribute-based encryption is a promising cryptographic method which provides the fine-grained access, which makes it very useful in case of group sharing applications. This solution has initially been developed on a central authority model. Later, it has been extended to a multi-authority model which is more convenient and more reliable. However, the revocation problem is still the major challenge of this approach. There have been few proposed revocation solutions for the Multi-authority scheme and these solutions suffer from the lack of efficiency. In this paper, we propose an access control mechanism on a multi-authority architecture with an immediate and efficient attributes' or users' revocation. The proposed scheme uses decentralized CP-ABE to provide flexible and fine-grained access. Our solution provides collusion resistance, prevents security degradations, supports scalability and does not require keys' redistribution.

URLhttps://ieeexplore.ieee.org/document/8029420?reload=true
DOI10.1109/Trustcom/BigDataSE/ICESS.2017.217
Citation Keyimine_immediate_2017