Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage

被引:36
作者
Cheng, Yong [1 ]
Wang, Zhi-ying [1 ]
Ma, Jun [1 ]
Wu, Jiang-jiang [1 ]
Mei, Song-zhu [1 ]
Ren, Jiang-chun [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China
来源
JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS | 2013年 / 14卷 / 02期
基金
中国国家自然科学基金;
关键词
Revocation optimization; Cryptographic access control; Cloud storage;
D O I
10.1631/jzus.C1200240
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is secure for customers to store and share their sensitive data in the cryptographic cloud storage. However, the revocation operation is a sure performance killer in the cryptographic access control system. To optimize the revocation procedure, we present a new efficient revocation scheme which is efficient, secure, and unassisted. In this scheme, the original data are first divided into a number of slices, and then published to the cloud storage. When a revocation occurs, the data owner needs only to retrieve one slice, and re-encrypt and re-publish it. Thus, the revocation process is accelerated by affecting only one slice instead of the whole data. We have applied the efficient revocation scheme to the ciphertext-policy attribute-based encryption (CP-ABE) based cryptographic cloud storage. The security analysis shows that our scheme is computationally secure. The theoretically evaluated and experimentally measured performance results show that the efficient revocation scheme can reduce the data owner's workload if the revocation occurs frequently.
引用
收藏
页码:85 / 97
页数:13
相关论文
共 33 条
[1]  
Amazon, 2012, AM SIMPL STOR SERV
[2]  
[Anonymous], 2011, PROC 2 INT WORKSHOP
[3]  
[Anonymous], 2008, JERASURE LIB C C FAC
[4]  
Backes M, 2006, THIRD INTERNATIONAL IEEE SECURITY IN STORAGE WORKSHOP, PROCEEDINGS, P1
[5]  
Bethencourt J., 2012, CIPHERTEXT POLICY AT
[6]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[7]   Automated formal analysis of a protocol for secure file sharing on untrusted storage [J].
Blanchet, Bruno ;
Chaudhuri, Avik .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :417-+
[8]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[9]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[10]  
di Vimercati S.D. C., 2007, P 33 INT C VERY LARG, P123