Please wait a minute...
Frontiers of Information Technology & Electronic Engineering  2013, Vol. 14 Issue (2): 85-97    DOI: 10.1631/jzus.C1200240
    
Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren
Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren
School of Computer, National University of Defense Technology, Changsha 410073, China
 全文: PDF 
Abstract: It is secure for customers to store and share their sensitive data in the cryptographic cloud storage. However, the revocation operation is a sure performance killer in the cryptographic access control system. To optimize the revocation procedure, we present a new efficient revocation scheme which is efficient, secure, and unassisted. In this scheme, the original data are first divided into a number of slices, and then published to the cloud storage. When a revocation occurs, the data owner needs only to retrieve one slice, and re-encrypt and re-publish it. Thus, the revocation process is accelerated by affecting only one slice instead of the whole data. We have applied the efficient revocation scheme to the ciphertext-policy attribute-based encryption (CP-ABE) based cryptographic cloud storage. The security analysis shows that our scheme is computationally secure. The theoretically evaluated and experimentally measured performance results show that the efficient revocation scheme can reduce the data owner’s workload if the revocation occurs frequently.
Key words: Revocation optimization    Cryptographic access control    Cloud storage
收稿日期: 2012-08-12 出版日期: 2013-01-31
CLC:  TP309.2  
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  
Yong Cheng
Jun Ma
Zhi-ying Wang
Jiang-jiang Wu
Song-zhu Mei
Jiang-chun Ren

引用本文:

Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren. Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage. Front. Inform. Technol. Electron. Eng., 2013, 14(2): 85-97.

链接本文:

http://www.zjujournals.com/xueshu/fitee/CN/10.1631/jzus.C1200240        http://www.zjujournals.com/xueshu/fitee/CN/Y2013/V14/I2/85

[1] Shuang Tan, Yan Jia. NaEPASC:一种新颖且高效的云数据公开审计机制[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(9): 794-804.
[2] Hong-yuan Chen, Yue-sheng Zhu. A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(8): 573-584.
[3] Chen-hua Ma, Guo-dong Lu, Jiong Qiu. An authorization model for collaborative access control[J]. Front. Inform. Technol. Electron. Eng., 2010, 11(9): 699-717.
[4] Xian-ting ZENG, Xue-zeng PAN, Ling-di PING, Zhuo LI. Robust lossless data hiding scheme[J]. Front. Inform. Technol. Electron. Eng., 2010, 11(2): 101-110.