Abstract
Recently, with the development of cloud computing, it has become possible to store and share data in cloud environments; however, there are various security threats in these environments. Attacker can leak stored data and, above all, service providers cannot be trusted completely. Therefore, security technologies guaranteeing that data remains secure when stored in cloud environments are required. To this end, researchers are studying techniques based on CP-ABE. However, vulnerabilities to various security threats remain and some schemes are inefficient. In this paper, we apply CP-ABE to address some of the security threats associated with cloud environments, by ensuring that only authorized users can access data stored in the cloud. In addition, we propose an access control system that, in comparison to existing schemes, is more computationally efficient when attributes are revoked.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 321–324 (2007)
Sekhar, B.R., Kumar, B.S., Reddy, L.S., PoornaChandar, V.: CP-ABE based encryption for secured cloud storage access. Int. J. Sci. Eng. Res. 3(9), 1–5 (2012)
Zhu, S., Yang, X.: Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2), 91–97 (2015)
Xu, Z., Martin, K.M.: Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 844–849. IEEE (2012)
Yang, K., Jia, X.: Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 523–528. ACM (2013)
Ramesh, D., Priya, R.: Multi-authority scheme based CP-ABE with attribute revocation for cloud data storage. In: 2016 International Conference on Microelectronics, Computing and Communications (MicroCom), pp. 1–4. IEEE (2016)
Stallings, W.: Cryptography and Network Security: Principles and Practice, Global edn. Pearson Education Limited, London (2016)
Acknowledgments
This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2017-0-00156, The Development of a Secure Framework and Evaluation Method for Blockchain) and Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2016R1D1A1B03935917).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Hwang, YW., Lee, IY. (2020). A Study on Secure Data Access Scheme Based on CP-ABE in Cloud Environments. In: Park, J., Park, DS., Jeong, YS., Pan, Y. (eds) Advances in Computer Science and Ubiquitous Computing. CUTE CSA 2018 2018. Lecture Notes in Electrical Engineering, vol 536. Springer, Singapore. https://doi.org/10.1007/978-981-13-9341-9_61
Download citation
DOI: https://doi.org/10.1007/978-981-13-9341-9_61
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9340-2
Online ISBN: 978-981-13-9341-9
eBook Packages: EngineeringEngineering (R0)