CLC number: TP309.2
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2019-06-11
Cited: 0
Clicked: 6397
Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang. Generic attribute revocation systems for attribute-based encryption in cloud storage[J]. Frontiers of Information Technology & Electronic Engineering, 2019, 20(6): 773-786.
@article{title="Generic attribute revocation systems for attribute-based encryption in cloud storage",
author="Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="20",
number="6",
pages="773-786",
year="2019",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.1800512"
}
%0 Journal Article
%T Generic attribute revocation systems for attribute-based encryption in cloud storage
%A Genlang Chen
%A Zhiqian Xu
%A Jia-jian Zhang
%A Guo-jun Wang
%A Hai Jiang
%A Miao-qing Huang
%J Frontiers of Information Technology & Electronic Engineering
%V 20
%N 6
%P 773-786
%@ 2095-9184
%D 2019
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.1800512
TY - JOUR
T1 - Generic attribute revocation systems for attribute-based encryption in cloud storage
A1 - Genlang Chen
A1 - Zhiqian Xu
A1 - Jia-jian Zhang
A1 - Guo-jun Wang
A1 - Hai Jiang
A1 - Miao-qing Huang
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 20
IS - 6
SP - 773
EP - 786
%@ 2095-9184
Y1 - 2019
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.1800512
Abstract: attribute-based encryption (ABE) has been a preferred encryption technology to solve the problems of data protection and access control, especially when the cloud storage is provided by third-party service providers. ABE can put data access under control at each data item level. However, ABE schemes have practical limitations on dynamic attribute revocation. We propose a generic attribute revocation system for ABE with user privacy protection. The attribute revocation ABE (AR-ABE) system can work with any type of ABE scheme to dynamically revoke any number of attributes.
[1]Au MH, Tsang PP, Susilo W, et al., 2009. Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems. In: Fischlin M (Ed.), Topics in Cryptology-CT-RSA. Springer Berlin, Germany, 5473:295-308.
[2]Bethencourt J, Sahai A, Waters B, 2007. Ciphertext-policy attribute-based encryption. Proc IEEE Symp on Security and Privacy, p.321-334.
[3]Boneh D, 1998. The decision Diffie-Hellman problem. 3rd Algorithmic Number Theory Symp, 1423:48-63.
[4]Boneh D, Boyen X, Shacham H, 2004. Short group signatures. In: Franklin M (Ed.), Advances in Cryptology-CRYPTO. Springer Berlin, Germany, 3152:227-242.
[5]Carroll M, van der Merwe A, Kotzé P, 2011. Secure cloud computing: benefits, risks and controls. Information Security South Africa, p.1-9.
[6]Chen GL, Xu ZQ, Jiang H, et al., 2018. Generic user revocation systems for attribute-based encryption in cloud storage. Front Inform Technol Electron Eng, 19(11):1362-1384.
[7]Gibson J, Rondeau R, Eveleig D, et al., 2012. Benefits and challenges of three cloud computing service models. 4th Int Conf on Computational Aspects of Social Networks, p.198-205.
[8]Hur J, Noh DK, 2011. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parall Distrib Syst, 22(7):1214-1221.
[9]Imine Y, Lounis A, Bouabdallah A, 2017. Immediate attribute revocation in decentralized attribute-based encryption access control. IEEE Trustcom/BigDataSE/linebreak ICESS, p.33-40.
[10]Joux A, 2000. A one round protocol for tripartite Diffie-Hellman. In: Bosma W (Ed.), Algorithmic Number Theory. Springer Berlin, Germany, 1838:385-393.
[11]Joux A, Nguyen K, 2003. Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups. J Cryptol, 16(4):239-247.
[12]Katz J, Lindell Y, 2014. Introduction to Modern Cryptography (2nd Ed.). Chapman and Hall/CRC, Boca Raton, America.
[13]McCurley KS, 1990. The discrete logarithm problem. Proc Symp in Applied Mathematics, p.49-74.
[14]Menezes A, Okamoto T, Vanstone SA, 1993. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans Inform Theory, 39(5):1636-1646.
[15]Miller HG, Veiga J, 2009. Cloud computing: will commodity services benefit users long term? IT Prof, 11(6):57-59.
[16]Naruse T, Mohri M, Shiraishi Y, 2014. Attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. In: Park J, Stojmenovic I, Choi M, et al. (Eds.), Future Information Technology. Springer Berlin Heidelberg, 276:119-125.
[17]Sahai A, Waters B, 2005. Fuzzy identity-based encryption. In: Cramer R (Ed.), Advances in Cryptology-EUROCRYPT. Springer Berlin, Germany, 3494:457-473.
[18]Verheul ER, 2001. Self-blindable credential certificates from the weil pairing. In: Boyd C (Ed.), Advances in Cryptology-ASIACRYPT. Springer Berlin, Germany, 2248:533-551.
[19]Wang PP, Feng DG, Zhang LW, 2011. Towards attribute revocation in key-policy attribute based encryption. In: Lin D, Tsudik G, Wang X (Eds.), Cryptology and Network Security. Springer Berlin, Germany, 7092:272-291.
[20]Xie XX, Ma H, Li J, et al., 2013. New ciphertext-policy attribute-based access control with efficient revocation. In: Mustofa K, Neuhold EJ, Tjoa AM, et al. (Eds.), Information and Communication Technology. Springer Berlin, Germany, 7804:373-382.
[21]Xue L, Yu Y, Li YN, et al., 2018. Efficient attribute-based encryption with attribute revocation for assured data deletion. Inform Sci, 479:640-650.
[22]Yang K, Jia XH, Ren K, 2013. Attribute-based fine-grained access control with efficient revocation in cloud storage systems. Proc 8th ACM SIGSAC Symp on Information, Computer and Communications Security, p.523-528.
[23]Yu SC, Wang C, Ren K, et al., 2010. Attribute based data sharing with attribute revocation. Proc 5th ACM Symp on Information, Computer and Communications Security, p.261-270.
Open peer comments: Debate/Discuss/Question/Opinion
<1>