Abstract
Attribute-Based Encryption (ABE) is one of the promising cryptographic primitives for fine-grained access control of shared outsourced data in cloud computing. However, before ABE can be deployed in data outsourcing systems, it has to provide efficient enforcement of authorization policies and policy updates. However, in order to tackle this issue, efficient and secure attribute and user revocation should be supported in original ABE scheme, which is still a challenge in existing work. In this paper, we propose a new ciphertext-policy ABE (CP-ABE) construction with efficient attribute and user revocation. Besides, an efficient access control mechanism is given based on the CP-ABE construction with an outsourcing computation service provider.
Chapter PDF
Similar content being viewed by others
References
Hur, J., Noh, D.K.: Attribute-based Access Control with Efficient Revocation in Data Outsourcing System. IEEE Transactions on Parallel and Distributed System, 1214–1221 (2011)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-Policy Attribute-Based Encryption. In: Proc. IEEE Symp. Security and Privacy, pp. 321–334 (2007)
Boldyreva, A., Goyal, V., Kumar, V.: Identity-Based Encryption with Efficient Revocation. In: Proc. ACM Conf. Computer and Comm. Security, pp. 417–426 (2008)
Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure Attribute-Based Systems. In: Proc. ACM Conf. Computer and Comm. Security (2006)
Rafaeli, S., Hutchison, D.: A Survey of Key Management for Secure Group Communication. ACM Computing Surveys 35(3), 309–329 (2003)
Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., Jonker, W.: Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. In: Proc. Int’l Workshop Information Security Architecture, CSAW 2007 (2007)
Yu, S., Wang, C., Ren, K., Lou, W.: Attribute Based Data Sharing with Attribute Revocation. In: Proc. ACM Symp. Information, Computer and Comm. Security, ASIACCS 2010 (2010)
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-Based Encryption with Non-Monotonoc Access Structures. In: Proc. ACM Conf. Computer and Comm. Security, pp. 195–203 (2007)
Liang, X., Lu, R., Lin, X., Shen, X.: Ciphertext Policy Attribute Based Encryption with Efficient Revocation. Technical Report, Univ. of Waterloo (2011), http://bbcr.uwaterloo.ca/x27liang/papers/abe/%20with%20revocation.pdf
Attrapadung, N., Imai, H.: Conjunctive Broadcast and Attribute-Based Encryption. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 248–265. Springer, Heidelberg (2009)
Zhou, Z., Huang, D.: Efficient and Secure Data Storage Operations for Mobile Cloud Computing. Cryptology ePrint Archive, Report: 2011/185 (2011)
Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Effcient, and Provably Secure Realization. Communications of the ACM, 53–70 (2011)
Shamir, A.: How to Share a Secret. Computer Science, 612–613 (1979)
Wang, J., Ma, H., Tang, Q., Lin, J., Zhu, H., Ma, S., Chen, X.: A New Efficient Verifiable Fuzzy Keyword Search Scheme. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications 3(4), 61–71 (2012)
Zhao, Y., Chen, X., Ma, H., Tang, Q., Zhu, H.: A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications 3(1/2), 72–81 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xie, X., Ma, H., Li, J., Chen, X. (2013). New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds) Information and Communication Technology. ICT-EurAsia 2013. Lecture Notes in Computer Science, vol 7804. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36818-9_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-36818-9_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36817-2
Online ISBN: 978-3-642-36818-9
eBook Packages: Computer ScienceComputer Science (R0)