{"title":"A cloud based enhanced CPABE framework for efficient user and attribute-level revocation","authors":"Shobha Chawla, N. Gupta","doi":"10.1080/1206212X.2023.2250149","DOIUrl":null,"url":null,"abstract":"Outsourcing massive amounts of data to the cloud service provider (CSP) has raised various security concerns for data confidentiality and access control. The ciphertext policy attribute based encryption (CPABE) scheme allows data owners to impose access control on their cloud-resident sensitive data. This paper has studied the approaches adopted to revoke users by the existing bilinear pairing cryptography based CPABE schemes. The existing studies have suggested solutions to revocation either by updating the non-revoked users’ keys or updating the ciphertext. Such approaches increase computational overhead for resource-constrained devices. In addition, a few studies have discussed the possibility of the CSP becoming dishonest and colluding with the revoked users. The likelihood of a collusion attack caused by the CSP and the revoked users also needs extensive attention. The development of the proposed proxy-based framework aims to extend the existing CPABE scheme and simplify the revocation of access rights at the user and attribute level with scalability, dynamicity, collusion resistance, and forward/backward secrecy. The proposed framework uses bilinear pairing cryptography and LSSS as an access structure. Furthermore, the security and performance analysis of the proposed framework reflects that it is implementable, better, and more secure than the existing work.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"42 1","pages":"523 - 533"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computers and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/1206212X.2023.2250149","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0
Abstract
Outsourcing massive amounts of data to the cloud service provider (CSP) has raised various security concerns for data confidentiality and access control. The ciphertext policy attribute based encryption (CPABE) scheme allows data owners to impose access control on their cloud-resident sensitive data. This paper has studied the approaches adopted to revoke users by the existing bilinear pairing cryptography based CPABE schemes. The existing studies have suggested solutions to revocation either by updating the non-revoked users’ keys or updating the ciphertext. Such approaches increase computational overhead for resource-constrained devices. In addition, a few studies have discussed the possibility of the CSP becoming dishonest and colluding with the revoked users. The likelihood of a collusion attack caused by the CSP and the revoked users also needs extensive attention. The development of the proposed proxy-based framework aims to extend the existing CPABE scheme and simplify the revocation of access rights at the user and attribute level with scalability, dynamicity, collusion resistance, and forward/backward secrecy. The proposed framework uses bilinear pairing cryptography and LSSS as an access structure. Furthermore, the security and performance analysis of the proposed framework reflects that it is implementable, better, and more secure than the existing work.
期刊介绍:
The International Journal of Computers and Applications (IJCA) is a unique platform for publishing novel ideas, research outcomes and fundamental advances in all aspects of Computer Science, Computer Engineering, and Computer Applications. This is a peer-reviewed international journal with a vision to provide the academic and industrial community a platform for presenting original research ideas and applications. IJCA welcomes four special types of papers in addition to the regular research papers within its scope: (a) Papers for which all results could be easily reproducible. For such papers, the authors will be asked to upload "instructions for reproduction'''', possibly with the source codes or stable URLs (from where the codes could be downloaded). (b) Papers with negative results. For such papers, the experimental setting and negative results must be presented in detail. Also, why the negative results are important for the research community must be explained clearly. The rationale behind this kind of paper is that this would help researchers choose the correct approaches to solve problems and avoid the (already worked out) failed approaches. (c) Detailed report, case study and literature review articles about innovative software / hardware, new technology, high impact computer applications and future development with sufficient background and subject coverage. (d) Special issue papers focussing on a particular theme with significant importance or papers selected from a relevant conference with sufficient improvement and new material to differentiate from the papers published in a conference proceedings.