An efficient scheme to support direct revocation in cloud computing using CPABE: The approach with less time constraints

  • Authors

    • Rupali G. Dande Sandip Foundation Nashik,SPPU
    • Dr Amol D. Potgantwar
    • Dr Amol D. Potgantwar
    2018-08-04
    https://doi.org/10.14419/ijet.v7i3.14636
  • ABE, Access structure, CPABE, Cloud Computing, Cloud Security, File Hierarch, Revocation.
  • Abstract

    Secure Data sharing is a major issue of concern in cloud computing. CPABE is well known encryption technique for dealing with the problem of data security over network. Most of the files have multilevel access hierarchy especially in health care and military domain. The hierarchy structure and revocation of shared files is not scrutinized in CP-ABE.  In this paper, experts proposed the enhanced method of encryption to support the direct revocation, in which sender specifies the revocation list during encryption of cipher text so that the problem of releasing periodic key update information in indirect revocation is vanished. Here the direct revocation mechanism and file access based hierarchy are merged to get enhanced CPABE. The multilevel access structure is integrated and merged with encrypted files with current access structure. Along with revocation, aim is also to improve the overall system performance with respect to encryption time and decryption time. Experimental result shows the enhanced performance of the proposed system as compared to existing system with respect to time and security constraints. Moreover the scheme is secure under the standard security assumption. Finally, based on the research, it gives forthcoming research direction to expand and implement the scheme in any practical application where security is main concern by proper coalition of the proposed technologies.

     

     

  • References

    1. [1] Hashizume et al.,â€An analysis of security issues for cloudcomputingâ€, Journal of Internet Services and Applications, 2013.https://doi.org/10.1186/1869-0238-4-5.

      [2] J.Bethencourt, A. Sahai and B. Waters, Ciphertext-policy attribute based encryption, Proc. IEEE Symposium on Security and Privacy, pp. 321-334, 2007.https://doi.org/10.1109/SP.2007.11.

      [3] A. Sahai, B. Waters, Fuzzy identity based encryption, Proc. EUROCRYPT 2005, LNCS 3494, Springer, pp. 457473, 2005.https://doi.org/10.1007/11426639_27.

      [4] Jiguo Li, Yao Wang, Yichen Zhang and Jinguang Han, “Full Verifiability for Outsourced Decryption in Attribute Based Encryptionâ€,February 2016, IEEE Transactions.

      [5] Chun-I Fan, Yi-Fan Tseng, and Chih-Wen Lin, “Attribute-Based Encryption from Identity-Based Encryptionâ€, SEPTEMBER 2016, JOURNAL OF LATEX CLASS FILES.

      [6] “AnandTripathi and GowthamRajappan,â€Scalable Transaction Management for Partially Replicated Data in Cloud Computing Environmentâ€, 2016 IEEE 9th International Conference on Cloud Computing.

      [7] V. Goyal, O. Pandey, A. Sahai and B.Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proc. 13th ACM conference on Computer and Communications Security, pp. 89-98, 2006.

      [8] Yibin Li a,KekeGaib,LongfeiQiu, MeikangQiub,Hui Zhao d,“Intelligent cryptography approach for secure distributed big data storage in cloud computingâ€, 2016,ELSEVIER..

      [9] Cheng-Chi Lee, Pei-Shan Chung, and Min-Shiang Hwang, “A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environmentsâ€, International Journal of Network Security, July 2013.

      [10] S.Mahdiet.al, “Challenges and security issues in Cloud computing from two perspectives: Data Security and Privacy Protectionâ€, 2015, KBEI.

      [11] DimitroZissis,DimitosLekkas, â€Addressing CC security issuesâ€,2010, ELSEVIER.

      [12] PalivelaHemant,NitinChawande,et al., â€Development of servers in CC to solve issues related to security and backup â€2011,IEEE.

      [13] VasilySidorov,WeeKeong Ng, â€Transparent Data Encryption for Data-in-Use and Data-at-Rest in a Cloud-Based Database-as-a-Service Solutionâ€, 2015, IEEE.

      [14] G Wang et al,Hierarchical ABE for fine grained access control in cloud storage services,17th ACM conference on computer and communication security ,2010.

      [15] Dong,Wang, â€Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigmâ€,2015,IEEE transactions on cloud.

      [16] Hui Yin,ZhengQin,et,al., â€Achieving secure ,universal,fine grained query results verification for secure search scheme over encrypted cloud data â€,2016,IEEE transactions on cloud.

      [17] Naeem Ahmed, â€Cloud Computing: Technology, Security Issues and Solutionsâ€,2017,IEEE

      [18] Jiang Schuci,GuoWeibin et al,â€Hierarchy Attribute -Based Encryption scheme to support direct revocation in cloud storageâ€,2017,IEEE.

      [19] Cheng-Chi Lee et al, “A survey on attribute based encryption schemes of access control in cloud environmentâ€, July 2013, International journal of network security.

      [20] HuilingQianJiguoLiYichenZhang,et al., â€Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structureâ€,2013,International Conference on Information and Communications Security.

      [21] SuhairAlshehri, Stanisaw P. Radziszowski, and Rajendra K. Ra “Secure Access for Healthcare Data in the Cloud Using Ciphertext-Policy Attribute-Based Encryptionâ€, 2012 IEEE 28th International Conference on Data Engineering Workshops.https://doi.org/10.1109/ICDEW.2012.68.

      [22] Cheng Guo1,2 Ruhan Zhuang1,2,Yingmo Jie1, Yizhi Ren, Ting Wu, “Kim-Kwang Raymond Choo,â€Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Cloudsâ€,2016 Cross- Mark

      [23] M. Green, S. Hohenberger, and B. Waters, “Outsourcing the decryption of ABE ciphertexts, Proc. The Usenix Security Symposium, pp. 34-34, 2011.

      [24] J. Lai, R. Deng, C. Guan, and J. Weng, “Attribute-based encryption with verifiable outsourced decryptionâ€, IEEE Trans. Information Forensics and Security, vol. 8, no. 8, pp. 1343-1354, 2013, https://doi.org/10.1109/TIFS.2013.2271848.

      [25] B. Qin, R.H. Deng, S. Liu and S. Ma, “Attribute-based encryption with efficient verifiable outsourced decryptionâ€, IEEE Trans. Information Forensics and Security, vol. 10, no. 7, pp. 1384-1393, 2015, https://doi.org/10.1109/TIFS.2015.2410137.

      [26] X. Mao, J. Lai, Q. Mei, K. Chen and J. Weng, Generic and efficient Constructions of attribute-based encryption with verifiable outsourced decryption, IEEE Trans. Dependable and Secure Computing, 2015, https://doi.org/10.1109/TDSC.2015.2423669.

      [27] Edonardo Gaetani et al [27], Blockchain based database to ensure data integrity in cloud environments.

      [28] Chun-I Fan Attribute Based Encryption from Identity Based encryption, Journal of LATEX class files,September 2016.

      [29] Matthew Green,Brnt Waters ,Susan Hohenberger, Outsourcing the decryption of ABE cipher texts,Proc. The usenix security symposium, pp.34-34, 2011.

      [30] William Stallings Cryptography and Network Security Principles and Practices, Fourth Edition.

  • Downloads

  • How to Cite

    G. Dande, R., Amol D. Potgantwar, D., & Amol D. Potgantwar, D. (2018). An efficient scheme to support direct revocation in cloud computing using CPABE: The approach with less time constraints. International Journal of Engineering & Technology, 7(3), 1668-1673. https://doi.org/10.14419/ijet.v7i3.14636

    Received date: 2018-06-24

    Accepted date: 2018-07-05

    Published date: 2018-08-04