Abstract
Nowadays, many organizations are adopting cloud computing for storing the large amount of organization’s important and private data. Here, it becomes important to mange appropriate access rights to these data as it is stored outside the organization’s boundary and is handled by the third party service providers. The Ciphertext Policy Attribute-based Encryption (CPABE) scheme is the most widely utilized technique that offers encrypted access control. In the existing implementations of CPABE scheme, one of the significant issues that need to be addressed is an efficient revocation mechanism. In this paper a direct and immediate user revocation approach for CPABE scheme is presented. The proposed method offers direct user revocation by maintaining the revocation list and to keep revocation list smaller the validity time is embedded in the user’s secret key. The revoked users are still able to access the previously generated ciphertexts. Hence, ciphertext update process is incorporated and a separate immediate revocation list is maintained so that the revoked users’ access is restricted. Also, in the proposed system the revocation information is embedded in ciphertext as a separate part so the update process of ciphertext is more efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Sahai, B. Waters, Fuzzy identity based encryption. J. Adv. Cryptol. Eurocrypt. 3494, 457–473 (2005)
J. Bethencourt, A. Sahai, B. Waters, Ciphertext policy attribute based encryption, in IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute based encryption for fine-grained access control of encrypted data, in Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98 (2006)
L. Zhe, W. Fuqun, C. Kefei, T. Fei, A new user revocable ciphertext-policy attribute-based encryption with ciphertext update. J. Secur. Commun. Netw. 2020, 1–11 (2020)
W. Weijia, W. Zhijie, L. Bing, D. Qiuxiang, H. Dijiang, IRCP-ABE: identity revocable ciphertext-policy attribute-based encryption for flexible secure group based communication. J. IACR Cryptol. ePrint Archive. 1100, 1–14 (2017)
J.K. Liu, T. H. Yuen, P. Zhang, K. Liang, Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list. J. Appl. Cryptogr. Netw. Secur. 516-534 (2018)
L. Zoe, Jiang, Z. Ruoqing, L. Zechao, S.M. Yiu, C.K. Lucas, X.W. Hui, F. Junbin, A Revocable Outsourcing Attribute-Based Encryption Scheme. In:Lecture Notes of the Institute for Computer Sciences. (2018)
W. Guangbo, W. Jianhua, Research on ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage. J. Math. Probl. Eng. 2017, 1–12 (2017)
H. Dezhi, P. Nannan, K. Li, A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection (IEEE Trans. Depend, Secur Comput, 2020)
E. Kennedy, J. Beakcheol, W.K. Jong, Collaborative ehealth privacy and security: an access control with attribute revocation based on OBDD access structure. IEEE J. Biomed. Health Inform. 24(10) (2020)
W. Zhijun, Z. Yun, X. Enzhong, Multi-authority revocable access control method based on CP-ABE in NDN. J. Fut. Internet. 12(1) (2020)
Z. Dominik, M. Alexander, Efficient revocable attribute-based encryption with hidden policies, in IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1638–1645 (2020)
G. Rui, Y. Geng, S. Huixian, Z. Yinghui, Z. Dong, O3-R-CP-ABE: an efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system. IEEE Internet Things J. 8(11), 8949–8963 (2021)
Y. Yao, G. Lei, L. Shumei, Z. Jian, W. Hongli, Privacy protection scheme based on CP-ABE in crowdsourcing-IoT for smart ocean. IEEE Internet Things J. 7(10), 10061–10071 (2020)
Z. Yang, X. Xin, Z. Xing, D. Yi, A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage. J. Math. Biosci. Eng. 16(5), 4229–4249 (2019)
H. Yong-Woon, L. Im-Yeong, CP-ABE access control that block access of withdrawn users in dynamic cloud. Ksii Trans. Internet Inform. Syst. 14(10), 4136–4156 (2020)
M. Jun, W. Minshen, X. Jinbo, H. Yongjin, CP-ABE-based secure and verifiable data deletion in cloud. J. Secur. Commun. Netw. 2021, 1–14 (2021)
S. Tu, M. Waqas, F. Huang, G. Abbas, Z.H. Abbas, A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing. J. Comput. Netw. 195, 108196 (2021)
A.D. Caro, V. Iovino, jPBC: Java pairing based cryptography, in Proceedings of the 2011 IEEE Symposium on Computers and Communications, pp. 850–855 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mujawar, T.N., Bhajantri, L.B. (2022). Efficient Direct and Immediate User Revocable Attribute-Based Encryption Scheme. In: Raj, J.S., Shi, Y., Pelusi, D., Balas, V.E. (eds) Intelligent Sustainable Systems. Lecture Notes in Networks and Systems, vol 458. Springer, Singapore. https://doi.org/10.1007/978-981-19-2894-9_38
Download citation
DOI: https://doi.org/10.1007/978-981-19-2894-9_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-2893-2
Online ISBN: 978-981-19-2894-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)