Title | Access Control Scheme Supporting Attribute Revocation in Cloud Computing |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | He, YaChen, Dong, Guishan, Liu, Dong, Peng, Haiyang, Chen, Yuxiang |
Conference Name | 2021 International Conference on Networking and Network Applications (NaNA) |
Date Published | oct |
Keywords | Access Control, attribute revocation, attribute-based encryption, cloud computing, Costs, data privacy, Encryption, Human Behavior, Market research, policy-based governance, pubcrawl, Public key, Scalability |
Abstract | To break the data barrier of the information island and explore the value of data in the past few years, it has become a trend of uploading data to the cloud by data owners for data sharing. At the same time, they also hope that the uploaded data can still be controlled, which makes access control of cloud data become an intractable problem. As a famous cryptographic technology, ciphertext policy-based attribute encryption (CP-ABE) not only assures data confidentiality but implements fine-grained access control. However, the actual application of CP-ABE has its inherent challenge in attribute revocation. To address this challenge, we proposed an access control solution supporting attribute revocation in cloud computing. Unlike previous attribute revocation schemes, to solve the problem of excessive attribute revocation overhead, we use symmetric encryption technology to encrypt the plaintext data firstly, and then, encrypting the symmetric key by utilizing public-key encryption technology according to the access structure, so that only the key ciphertext is necessary to update when the attributes are revoked, which reduces the spending of ciphertext update to a great degree. The comparative analysis demonstrates that our solution is reasonably efficient and more secure to support attribute revocation and access control after data sharing. |
DOI | 10.1109/NaNA53684.2021.00072 |
Citation Key | he_access_2021 |