CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud
- Authors
- Hwang, Yong-Woon; Lee, Im-Yeong
- Issue Date
- 31-Oct-2020
- Publisher
- 한국인터넷정보학회
- Keywords
- Attributes Based Encryption; Access Control; Attribute revocation; Constant-size ciphertext; Cloud; Data sharing
- Citation
- KSII Transactions on Internet and Information Systems, v.14, no.10, pp 4136 - 4156
- Pages
- 21
- Journal Title
- KSII Transactions on Internet and Information Systems
- Volume
- 14
- Number
- 10
- Start Page
- 4136
- End Page
- 4156
- URI
- https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/2388
- DOI
- 10.3837/tiis.2020.10.012
- ISSN
- 1976-7277
1976-7277
- Abstract
- Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Engineering > Department of Computer Software Engineering > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/2388)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.