Visible to the public Multi-Authority CP-ABE with Dynamical Revocation in Space-Air-Ground Integrated Network

TitleMulti-Authority CP-ABE with Dynamical Revocation in Space-Air-Ground Integrated Network
Publication TypeConference Paper
Year of Publication2020
AuthorsZhang, ZhiShuo, Zhang, Wei, Qin, Zhiguang
Conference Name2020 International Conference on Space-Air-Ground Computing (SAGC)
KeywordsComplexity theory, Computer architecture, Computer crashes, CP-ABE, Data security, Dynamical Key Revocation (DKR), Encryption, Heuristic algorithms, Multi-Authority CP-ABE (MA-CP-ABE), policy-based governance, pubcrawl, Scalability, Space-air-ground integrated network (SAGIN), Synchronization
AbstractSpace-air-ground integrated network (SAGIN) is emerged as a versatile computing and traffic architecture in recent years. Though SAGIN brings many significant benefits for modern communication and computing services, there are many unprecedented challenges in SAGIN. The one critical challenge in SAGIN is the data security. In SAGIN, because the data will be stored in cleartext on cloud, the sensitive data may suffer from the illegal access by the unauthorized users even the untrusted cloud servers (CSs). Ciphertext-policy attribute-based encryption (CP-ABE), which is a type of attribute-based encryption (ABE), has been regarded as a promising solution to the critical challenge of the data security on cloud. But there are two main blemishes in traditional CP-ABE. The first one is that there is only one attribute authority (AA) in CP-ABE. If the single AA crashs down, the whole system will be shut down. The second one is that the AA cannot effectively manage the life cycle of the users' private keys. If a user on longer has one attribute, the AA cannot revoke the user's private key of this attribute. This means the user can still decrypt some ciphertexts using this invalid attribute. In this paper, to solve the two flaws mentioned above, we propose a multi-authority CP-ABE (MA-CP-ABE) scheme with the dynamical key revocation (DKR). Our key revocation supports both user revocation and attribute revocation. And the our revocation is time friendly. What's more, by using our dynamically tag-based revocation algorithm, AAs can dynamically and directly re-enable or revoke the invalid attributes to users. Finally, by evaluating and implementing our scheme, we can observe that our scheme is more comprehensive and practical for cloud applications in SAGIN.
DOI10.1109/SAGC50777.2020.00026
Citation Keyzhang_multi-authority_2020