Loading [MathJax]/extensions/MathZoom.js
EAC: Encryption Access Control Scheme for Policy Revocation in Cloud Data | IEEE Conference Publication | IEEE Xplore

EAC: Encryption Access Control Scheme for Policy Revocation in Cloud Data


Abstract:

Since a lot of information is outsourcing into cloud servers, data confidentiality becomes a higher risk to service providers. To assure data security, Ciphertext Policy ...Show More

Abstract:

Since a lot of information is outsourcing into cloud servers, data confidentiality becomes a higher risk to service providers. To assure data security, Ciphertext Policy Attributes-Based Encryption (CP-ABE) is observed for the cloud environment. Because ciphertexts and secret keys are relying on attributes, the revocation issue becomes a challenge for CP-ABE. This paper proposes an encryption access control (EAC) scheme to fulfill policy revocation which covers both attribute and user revocation. When one of the attributes in an access policy is changed by the data owner, the authorized users should be updated immediately because the revoked users who have gained previous access policy can observe the ciphertext. Especially for data owners, four types of updating policy levels are predefined. By classifying those levels, each secret token key is distinctly generated for each level. Consequently, a new secret key is produced by hashing the secret token key. This paper analyzes the execution times of key generation, encryption, and decryption times between non-revocation and policy revocation cases. Performance analysis for policy revocation is also presented in this paper.
Date of Conference: 04-05 November 2020
Date Added to IEEE Xplore: 26 November 2020
ISBN Information:
Conference Location: Yangon, Myanmar
References is not available for this document.

1. Introduction

Currently, the use of cloud-based storage services is an enormous growth because they offer rentable frameworks based on pay per use pattern. During the use of cloud storage data, the lack of data control for the data owner can occur among the communications of the parties. Hence, data security for cloud storage is solved by studying the cryptographic techniques. Since the encryption technique is critical for the cloud data sharing system among the organizations, some of the existing encryption techniques can be applied for retrieving cloud data against unauthorized accesses. However, the traditional cryptographic techniques are not enough to be perfect security for cloud data because the data should be controlled by the data owner rather than the Cloud Service Providers (CSPs) [3]. Moreover, the access policies, which are controlled by the data owner, can be frequently updated according to several situations among the parties [10]. Mostly, access policies are specified as the values of the attributes of cloud users. Therefore, the researchers are interested in CP-ABE for retrieving the cloud storage data. Since the CP-ABE will grant the data owner the right to define access policy control, it is adopted by the cloud users as access control based on attributes. Despite the CP-ABE is popular in access control for the cloud environment, the attributes management is still at a critical point [1]. More policy changes can be more complex in key management [7]. Especially, the key management is essential for access policy changes when the data owner manages attributes for his authorized users. In this paper, a policy revocation is proposed for enhancing traditional CP-ABE because the traditional CP-ABE did not consider any revocation. In the rest of the paper, section 2 deals with the related works of CP-ABE. The research background is explained in section 3. The proposed EAC scheme is presented in section 4. The performance analysis and experimental results are shown in section 5. The conclusion and future work are included in section 6.

Select All
1.
R. R. Al-Dahhan, Q. Shi, G. M. Lee and K. Kifayat, "Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption", Sensors (Basel), vol. 19, no. 7, April 2019.
2.
J. Bethencourt, A. Sahai and B. Waters, "Ciphertext- Policy Attribute-Based Encryption", the Proceedings of IEEE Symposium on Security and Privacy (SP7‘07) IEEE Computer Society Washington, pp. 321-334, May 20–23, 2007.
3.
M. George, C. S. Gnanadhas and K. Saranya, "A Survey on Attribute-Based Encryption Scheme in Cloud Computing", International Journal of Advanced Research in Computer and Communication, vol. 2, no. 11, November 2013.
4.
S. Jahid and N. Borisov, "PIRATTE: Proxy-based Immediate Revocation of Attribute-based Encryption", Computer Science Cryptography and Security, August 2012.
5.
J. Li, W. Yao, Y. Zhang, H. Qian and J. Han, "Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing", Proceedings of IEEE Transactions on Services Computing, vol. 10, no. 5, pp. 785-796, September - October 1, 2017.
6.
J. K. Liu, T. H. Yuen, P. Zhang and K. Liang, "Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List", Proceedings of the 16th International Conference on Applied Cryptography and Network Security (ACNS), July 2–4, 2018.
7.
P. W. W. Myint, S. Z. Hlaing and E. C. Htoon, "A Policy Revocation Scheme for Attributes-based Encryption", Proceedings of the 10th International Conference on Advances in Information Technology (IAIT) ACM, pp. 16-23, Dec. 2018.
8.
P. W. W. Myint, S. Z. Hlaing and E. C. Htoon, "Policy-based Revolutionary Ciphertext-policy Attributes-based Encryption", Proceedings of the 3rd International Conference on Advanced Information Technologies (ICAIT), pp. 227-232, November, 2019.
9.
C. Wang, J. Wu, Y. Yuan and J. Liu, "Insecurity of Cheng et als Efficient Revocation in Ciphertext-Policy Attribute-based Encryption based Cryptographic Cloud Storage", IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), pp. 1387-1393, December 12–15, 2017.
10.
X. Xu, J. Zhou, X. Wang and Y. Zhang, "Multi-authority proxy re-encryption based on CPABE for cloud storage systems", Journal of Systems Engineering and Electronics (JSEE), vol. 27, no. 1, pp. 211-223, February 2016.
11.
K. Yang, X. Jia and K. Ren, "Attribute-based fine-grained access control with efficient revocation in cloud storage systems", Proceedings of the 8th ACM SIGSAC Symposium on Information Computer and Communications Security (ASIACCS), pp. 523-528, May 8–10, 2013.

Contact IEEE to Subscribe

References

References is not available for this document.