Detailed Information

Cited 0 time in webofscience Cited 5 time in scopus
Metadata Downloads

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

Authors
Hwang, Yong-WoonLee, Im-Yeong
Issue Date
31-Oct-2020
Publisher
한국인터넷정보학회
Keywords
Attributes Based Encryption; Access Control; Attribute revocation; Constant-size ciphertext; Cloud; Data sharing
Citation
KSII Transactions on Internet and Information Systems, v.14, no.10, pp 4136 - 4156
Pages
21
Journal Title
KSII Transactions on Internet and Information Systems
Volume
14
Number
10
Start Page
4136
End Page
4156
URI
https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/2388
DOI
10.3837/tiis.2020.10.012
ISSN
1976-7277
1976-7277
Abstract
Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Computer Software Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Im Yeong photo

Lee, Im Yeong
College of Software Convergence (Department of Computer Software Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE