30
Views
0
CrossRef citations to date
0
Altmetric
Articles

A cloud based enhanced CPABE framework for efficient user and attribute-level revocation

&
Pages 523-533 | Received 01 Apr 2023, Accepted 15 Aug 2023, Published online: 30 Aug 2023

References

  • Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data. Proc. ACM Conf. Comput. Commun. Secur; 2006. p. 89–98.
  • Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In 2007 IEEE Symp. Secur. Priv. 2007; 2018. p. 321–334.
  • Waters B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization,” Public Key Cryptogr. 2011 14th Int. Conf. Pract. Theory Public Key Cryptogr. Taormina, Italy., March; 2011. p. 53–70.
  • Liu JK, Yuen TH, Zhang P, et al. Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list. 16th Int. Conf. Appl. Cryptogr. Netw. Secur., July; 2018. p. 516–534.
  • Yang Y, Liu JK, Liang K, et al. Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data.” Comput. Secur. 2015 20th Eur. Symp. Res. Comput. Secur. Vienna, Austria, vol. 9327; 2015. p. 146–166.
  • Jahid S, Borisov N. PIRATTE: proxy-based immediate revocation of attribute-based encryption, 2012. p. 1–14. Available from: http://arxiv.org/abs/1208.4877.
  • Sethia D, Saran H, Gupta D. CP-ABE for selective access with scalable revocation: a case study for mobile-based healthfolder. Int J Netw Secur. 2018;20(4):689–701. doi:10.6633/IJNS.201807
  • Liu Z, Duan S, Zhou P, et al. Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. Futur Gener Comput Syst. 2019;93:903–913. doi:10.1016/j.future.2017.09.045
  • Liu Z, Wang F, Chen K, et al. A new user revocable ciphertext-policy attribute-based encryption with ciphertext update. Secur Commun Netw. 2020;2020:1–11. doi:10.1155/2020/8856592
  • Al-Dahhan RR, Shi Q, Lee GM, et al. Access privilege elevation and revocation in collusion-resistant cloud access control. Proc. 2nd World Conf. Smart Trends Syst. Secur. Sustain. WorldS4 2018, Oct; 2018. p. 209–214.
  • Wang H, Zheng Z, Wu L, et al. New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Cluster Comput. 2017;20(3):2385–2392. doi:10.1007/s10586-016-0701-7
  • Han D, Pan N, Li K-C. A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Trans Dependable Secur Comput. 2022: 316–327. doi:10.1109/tdsc.2020.2977646
  • Wu Y, Zhang W, Xiong H, et al. Efficient access control with traceability and user revocation in IoT. Multimed Tools Appl. 2021;80(20):31487–31508. doi:10.1007/s11042-021-11286-0
  • Liu Z, Ding Y, Yuan M, et al. Collusion resistance CP-ABE scheme with accountability, revocation and privacy preserving for cloud-based E-health system. Int J Netw Secur. 2022;24(4):597–611. doi:10.6633/IJNS.202207
  • Yeh LY, Chiang PY, Tsai YL, et al. Cloud-based fine-grained health information access control framework for Lightweight IoT devices with dynamic auditing and attribute revocation. IEEE Trans Cloud Comput. 2018;6(2):532–544. doi:10.1109/TCC.2015.2485199
  • Lian H, Wang Q, Wang G. Large universe ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage. Int Arab J Inf Technol. 2020;17(1):107–117. doi:10.34028/iajit/17/1/13
  • Zhao J, Zeng P, Choo KKR. An efficient access control scheme with outsourcing and attribute revocation for fog-enabled E-health. IEEE Access. 2021;9:13789–13799. doi:10.1109/ACCESS.2021.3052247
  • Wang G, Wang J. Research on ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage. Math Probl Eng. 2017;2017:1–12. doi:10.1155/2017/4070616
  • Li J, Yao W, Han J, et al. User collision avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Syst J. 2018;12(2):1767–1777. doi:10.1109/JSYST.2017.2667679
  • Yang K, Jia X, Ren K. Attribute-based fine-grained access control with efficient revocation in cloud storage systems. ASIA CCS 2013 - Proc. 8th ACM SIGSAC Symp. Information, Comput. Commun. Secur; 2013. p. 523–528.
  • Touati L, Challal Y. Batch-based CP-ABE with attribute revocation mechanism for the Internet of Things. 2015 Int. Conf. Comput. Netw. Commun. ICNC 2015; 2015. p. 1044–1049.
  • Naruse T, Mohri M, Shiraishi Y. Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Hum-centric Comput Inf Sci. 2015;5(1):1–13. doi:10.1186/s13673-015-0027-0
  • Hur J, Noh DK. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst. 2011;22(7):1214–1221. doi:10.1109/TPDS.2010.203
  • Wang S, Guo K, Zhang Y. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage. PLoS One. 2018;13(9):1–23. doi:10.1371/journal.pone.0203225
  • Abodoma N, Shaaban E, Mostafa A. Adaptive time-bound access control for internet of things in fog computing architecture. Int J Comput Appl. 2022;44(8). doi:10.1080/1206212X.2021.1935653
  • Zhang W, Zhang Z, Xiong H, et al. PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system. J Ambient Intell Humaniz Comput. 2022;0123456789; doi:10.1007/s12652-021-02922-6
  • Lewko A, Waters B. Unbounded HIBE and attribute-based encryption Annu. Int. Conf. Theory Appl. Cryptogr. Tech., May 15; 2011. p. 547–567.
  • Beimel A. Secure schemes for secret sharing and key distribution for the degree of doctor of science [PhD. Thesis]. Isr. Inst. Technol. Tech; 1996.
  • Akinyele JA, Green M, Rubin A. Charm: a framework for rapidly prototyping cryptosystems. J Cryptogr Eng. 2013; 3:111–128.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.