[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems

Published: 01 July 2011 Publication History

Abstract

Some of the most challenging issues in data outsourcing scenario are the enforcement of authorization policies and the support of policy updates. Ciphertext-policy attribute-based encryption is a promising cryptographic solution to these issues for enforcing access control policies defined by a data owner on outsourced data. However, the problem of applying the attribute-based encryption in an outsourced architecture introduces several challenges with regard to the attribute and user revocation. In this paper, we propose an access control mechanism using ciphertext-policy attribute-based encryption to enforce access control policies with efficient attribute and user revocation capability. The fine-grained access control can be achieved by dual encryption mechanism which takes advantage of the attribute-based encryption and selective group key distribution in each attribute group. We demonstrate how to apply the proposed mechanism to securely manage the outsourced data. The analysis results indicate that the proposed scheme is efficient and secure in the data outsourcing systems.

Cited By

View all
  • (2024)PASSP: A Private Authorization Scheme Oriented Service ProvidersIEEE Transactions on Network and Service Management10.1109/TNSM.2024.342072621:4(4888-4899)Online publication date: 28-Jun-2024
  • (2024)Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoTIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341971619(6499-6513)Online publication date: 1-Jan-2024
  • (2024)Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding BlockchainIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.331379921:4(2603-2618)Online publication date: 1-Jul-2024
  • Show More Cited By
  1. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image IEEE Transactions on Parallel and Distributed Systems
      IEEE Transactions on Parallel and Distributed Systems  Volume 22, Issue 7
      July 2011
      173 pages

      Publisher

      IEEE Press

      Publication History

      Published: 01 July 2011

      Author Tags

      1. Data outsourcing
      2. access control.
      3. attribute-based encryption
      4. ciphertext policy
      5. revocation

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)PASSP: A Private Authorization Scheme Oriented Service ProvidersIEEE Transactions on Network and Service Management10.1109/TNSM.2024.342072621:4(4888-4899)Online publication date: 28-Jun-2024
      • (2024)Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoTIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341971619(6499-6513)Online publication date: 1-Jan-2024
      • (2024)Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding BlockchainIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.331379921:4(2603-2618)Online publication date: 1-Jul-2024
      • (2024)Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in CloudsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.326597921:2(949-960)Online publication date: 1-Mar-2024
      • (2024)Revocable and Efficient Blockchain-Based Fine-Grained Access Control Against EDoS Attacks in Cloud StorageIEEE Transactions on Computers10.1109/TC.2024.339850273:8(2012-2024)Online publication date: 1-Aug-2024
      • (2024)Cross trustInternational Journal of Critical Infrastructure Protection10.1016/j.ijcip.2024.10066144:COnline publication date: 1-Mar-2024
      • (2024)A novel two phase data sensitivity based access control framework for healthcare dataMultimedia Tools and Applications10.1007/s11042-023-15427-583:3(8867-8892)Online publication date: 1-Jan-2024
      • (2024)Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharingCluster Computing10.1007/s10586-024-04283-z27:5(6013-6038)Online publication date: 1-Aug-2024
      • (2024)Key Cooperative Attribute-Based EncryptionInformation Security and Privacy10.1007/978-981-97-5025-2_13(241-260)Online publication date: 15-Jul-2024
      • (2024)Attribute‐based encryption scheme for secure data sharing in cloud with fine‐grained revocationSecurity and Privacy10.1002/spy2.3367:1Online publication date: 9-Jan-2024
      • Show More Cited By

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media