Hierarchical Access Structure-based Scheme with Outsourcing and Revocation Mechanism for Cloud Environment

Authors

DOI:

https://doi.org/10.26636/jtit.2023.4.1299

Keywords:

attribute revocation, cloud computing, hierarchical access control, outsourced decryption, trust

Abstract

Ciphertext policy attribute-based encryption (CPABE) is one of the efficient implementations of encrypted access control scheme for cloud computing. Though multiple implementations of CPABE exist, there are some issues that need to be addressed, including efficient revocation approach, decryption time, storage cost etc. In this paper, an efficient scheme that incorporates a hierarchical access structure, outsourced decryption, as well as user and attribute revocation is presented. The hierarchical access structure is utilized to encrypt multiple data using one common access structure and makes the encryption process more efficient. The outsourcing server is used to perform partial decryption, so that all heavy computations are performed by this server and less overhead is incurred by the data user. The proposed framework also integrates the evaluation of trustworthiness of data users and service providers to ensure trusted and encrypted access control procedures. The paper also presents an analysis of the time required for performing different operations. Simulation results show that the proposed scheme outperforms the existing approaches.

Downloads

Download data is not yet available.

References

A. Sahai and B. Waters, "Fuzzy Identity Based Encryption", in: Advances in Cryptology - EUROCRYPT 2005, vol. 3494, pp. 457-473, 2005. DOI: https://doi.org/10.1007/11426639_27
View in Google Scholar

J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext Policy Attribute based Encryption", IEEE Symposium on Security and Privacy, Berkeley, USA, pp. 321-334, 2007. DOI: https://doi.org/10.1109/SP.2007.11
View in Google Scholar

V. Goyal V, O. Pandey, A. Sahai, and B. Waters, "Attribute Based Encryption for Fine-Grained Access Conrol of Encrypted Data", Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, pp. 89-98, 2006. DOI: https://doi.org/10.1145/1180405.1180418
View in Google Scholar

Y. Yang, J. Sun, Z. Liu, and Y. Qiao, "Practical Revocable and Multi-authority CP-ABE Scheme from RLWE for Cloud Computing", Journal of Information Security and Applications, vol. 65, no. 6, art. no. 103108, 2022. DOI: https://doi.org/10.1016/j.jisa.2022.103108
View in Google Scholar

Z. Zhang, W. Zhang, and Z. Qin, "A Partially Hidden Policy CP-ABE Scheme Against Attribute Values Guessing Attacks with Online Privacy-protective Decryption Testing in IoT Assisted Cloud Computing", Future Generation Computer Systems, vol. 123, pp. 181-195, 2021. DOI: https://doi.org/10.1016/j.future.2021.04.022
View in Google Scholar

H. Zhong, Y. Zhou, Q. Zhang, Y. Xu, and J. Cui, "An Efficient and Outsourcing-supported Attribute-based Access Control Scheme for Edge-enabled Smart Healthcare", Future Generation Computer Systems, vol. 115, pp. 486-496, 2021. DOI: https://doi.org/10.1016/j.future.2020.09.021
View in Google Scholar

M. Mandal, "Privacy-preserving Fully Anonymous Ciphertext Policy Attribute-based Broadcast Encryption with Constant-size Secret Keys and Fast Decryption", Journal of Information Security and Applications, vol. 55, art. no. 102666, 2020. DOI: https://doi.org/10.1016/j.jisa.2020.102666
View in Google Scholar

S. Wang, S. Jia, and Y. Zhang, "Verifiable and Multi-keyword Searchable Attribute-based Encryption Scheme for Cloud Storage", IEEE Access, vol. 7, pp. 50136-50147, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2910828
View in Google Scholar

Y. He et al., "An Efficient Ciphertext-policy Attribute-based Encryption Scheme Supporting Collaborative Decryption With Blockchain", IEEE Internet of Things Journal, vol. 9, no. 4, pp. 2722-2733, 2022. DOI: https://doi.org/10.1109/JIOT.2021.3099171
View in Google Scholar

K. Yang et al., "Attribute Based Encryption with Efficient Revocation from Lattices", International Journal of Network Security, vol. 22, no.1, pp. 161-170, 2020.
View in Google Scholar

J. Li et al., "An Efficient Attribute-based Encryption Scheme With Policy Update and File Update in Cloud Computing", IEEE Transactions on Industrial Informatics, vol. 15, no. 12, pp. 6500-6509, 2019. DOI: https://doi.org/10.1109/TII.2019.2931156
View in Google Scholar

S. Tu, M. Waqas, F. Huang, G. Abbas, and Z.H. Abbas, "A Revocable and Outsourced Multi-authority Attribute-based Encryption Scheme in Fog Computing", Computer Networks, vol. 195, art. no. 108196, 2021. DOI: https://doi.org/10.1016/j.comnet.2021.108196
View in Google Scholar

W. Wang, Z. Wang, B. Li, Q. Dong, and D. Huang, "IR-CP-ABE: Identity Revocable Ciphertext-policy Attribute-based Encryption for Flexible Secure Group-based Communication", IACR Cryptology ePrint Archive, vol. 1100, pp. 1-14, 2017 (https://ia.cr/2017/1100).
View in Google Scholar

D. Han, N. Pan, and K.-C. Li, "A Traceable and Revocable Ciphertext-policy Attribute-based Encryption Scheme Based on Privacy Protection", IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 1, pp. 316-327, 2020. DOI: https://doi.org/10.1109/TDSC.2020.2977646
View in Google Scholar

Z. Liu, F. Wang, K. Chen, and F. Tang, "A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update", Security and Communication Networks, vol. 2020, art. no. 8856592, 2020. DOI: https://doi.org/10.1155/2020/8856592
View in Google Scholar

Z. Li et al., "An Efficient ABE Scheme with Verifiable Outsourced Encryption and Decryption", IEEE Access, vol. 7, pp. 29023-29037, 2019. DOI: https://doi.org/10.1109/ACCESS.2018.2890565
View in Google Scholar

J. Yu, G. He , X. Yan, Y. Tang, and R. Qin, "Outsourced Ciphertext-policy Attribute-based Encryption with Partial Policy Hidden", International Journal of Distributed Sensor Networks, vol. 16, no. 5, 2020. DOI: https://doi.org/10.1177/1550147720926368
View in Google Scholar

J. Li, Y. Zhang, X. Chen, and Y. Xiang, "Secure Attribute-based Data Sharing for Resource-limited Users in Cloud Computing", Computers and Security, vol. 72, pp. 1-12, 2018. DOI: https://doi.org/10.1016/j.cose.2017.08.007
View in Google Scholar

K. Fan, J. Wang, X. Wang, H. Li, and Y. Yang, "A Secure and Verifiable Outsourced Access Control Scheme in Fog-cloud Computing", Sensors, vol. 17, no. 7, pp. 1695-1710, 2017. DOI: https://doi.org/10.3390/s17071695
View in Google Scholar

R. Zhang, H. Ma, and Y. Lu, "Fine-grained Access Control System Based on Fully Outsourced Attribute-based Encryption", Journal of Systems and Software, vol. 125, no. 3, pp. 344-353, 2017. DOI: https://doi.org/10.1016/j.jss.2016.12.018
View in Google Scholar

J. Zhao, P. Zeng, and K.-K.R. Choo, "An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health", IEEE Access, vol. 9, pp. 13789-13799, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3052247
View in Google Scholar

T.N. Mujawar and L.B. Bhajantri, "Efficient Direct and Immediate User Revocable Attribute based Encryption Scheme", in: Proceedings of 5th International Conference on Intelligent Sustainable System (ICISS 2022), Tirunelveli, India, 2022 (https://link.springer.com/chapter/10.1007/978-981-19-2894-9_38). DOI: https://doi.org/10.1007/978-981-19-2894-9_38
View in Google Scholar

T.N. Mujawar and L.B. Bhajantri, "The Trusted Hierarchical Access Structure-Based Encryption Scheme for Cloud Computing", International Journal of Cloud Applications and Computing, vol. 12, no. 1, pp. 1-17, 2022. DOI: https://doi.org/10.4018/IJCAC.308273
View in Google Scholar

T.N. Mujawar and L.B. Bhajantri, "Behavior and Feedback Based Trust Computation in Cloud Environment", Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 8, pp. 4956-4967, 2022. DOI: https://doi.org/10.1016/j.jksuci.2020.12.003
View in Google Scholar

A. Lewko and B. Waters, "Decentralizing Attribute-based Encryption", in: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, 2011. DOI: https://doi.org/10.1007/978-3-642-20465-4_31
View in Google Scholar

A. De Caro and V. Iovino, "jPBC: Java Pairing Based Cryptography", in: 2011 IEEE Symposium on Computers and Communications, Kerkyra, Greece, 2011. DOI: https://doi.org/10.1109/ISCC.2011.5983948
View in Google Scholar

Downloads

Published

2023-11-28

Issue

Section

ARTICLES FROM THIS ISSUE

How to Cite

[1]
T. N. Mujawar, L. B. Bhajantri, and A. V. Sutagundar, “Hierarchical Access Structure-based Scheme with Outsourcing and Revocation Mechanism for Cloud Environment”, JTIT, vol. 94, no. 4, pp. 83–92, Nov. 2023, doi: 10.26636/jtit.2023.4.1299.