Abstract
Attribute-based encryption (ABE) is a promising approach to enables fine-grained access control for encrypted data in cloud storage. However, to design a flexible and effective revocation mechanism has always been a tricky problem for ABE, especially for the situations where revocation occurs frequently. In this work, we propose a practical attribute-based access control scheme by introducing ciphertext-policy attribute-based encryption (CP-ABE) that allows the trusted authority (TA) to efficiently manage the credentials of data users. The problem of revocation is solved efficiently by exploiting user binary tree. To achieve flexible revocation, our scheme supports both attribute revocation and user revocation to accommodate different revocation needs. Non-revoked users can still decrypt the ciphertext as long as his/her remaining attributes satisfy the access policy associated with the ciphertext. Moreover, verifiable ciphertext delegation is presented to reduce the heavy computation cost brought by frequent revocation. The merits of the proposed scheme are proved by comparing its performance and security with the related works.





Similar content being viewed by others
References
Akinyele JA, Garman C, Miers I, Pagano MW, Rushanan M, Green M, Rubin AD (2013) Charm: a framework for rapidly prototyping cryptosystems. J Cryptographic Eng:111–128. https://doi.org/10.1007/s13389-013-0057-3
Amit S, Brent W (2005) Fuzzy identity-based encryption. EUROCRYPT2005. Springer Berlin Heidelberg. pp 457–473. https://doi.org/10.1007/11426639_27
Attrapadung N, Herranz J, Laguillaumie F, Libert B, de Panafieu E, Ràfols C (2012) Attribute-based encryption schemes with constant-size ciphertexts. Theoretical Comput Sci, pp 15–38. https://doi.org/10.1016/j.tcs.2011.12.004
Bhaskar P R, Eunmi C, Ian L (2009) A taxonomy and survey of cloud computing systems. Fifth Inter Joint Conf on INC IMS and IDC, PP 44–51. https://doi.org/10.1109/NCM.2009.218
Boldyreva A, Goyal V, Kumar V (2008) Identity-based encryption with efficient revocation. In: Proceedings of the 15th ACM conference on computer and communications security, CCS ’08, ACM, pp 417–426. https://doi.org/10.1145/1455770.1455823
Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Advances in cryptology — CRYPTO 2001, Springer, pp 213–229. https://doi.org/10.1007/3-540-44647-8_13
Chase M (2007) Multi-authority attribute based encryption. In: Theory of cryptography. Springer, pp 515–534. https://doi.org/10.5555/1760749.1760787
Cui J, Zhou H, Xu Y, Zhong H (2019) Ooabks: Online/offline attribute-based encryption for keyword search in mobile cloud. Inf Sci:63–77. https://doi.org/10.1016/j.ins.2019.03.043
De SJ, Ruj S (2017) Efficient decentralized attribute based access control for mobile clouds. IEEE Trans Cloud Comput:1–1. https://doi.org/10.1109/TCC.2017.2754255
Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distributed Syst, pp 1214–1221. https://doi.org/10.1109/TPDS.2010.203
Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W (2009) Mediated ciphertext-policy attribute-based encryption and its application. In: Information Security applications, Springer, pp 309–323. https://doi.org/10.1007/978-3-642-10838-9_23
John B, Amit S, Brent W (2007) Ciphertext-policy attribute-based encryption. IEEE Symp on Secur Privacy, pp 321–334. https://doi.org/10.1109/SP.2007.11
Kumar P, PK P, SK P, Alphonse PJA (2018) Attribute based encryption in cloud computing: a survey, gap analysis, and future directions. J Network Comput Appl, pp 37–52. https://doi.org/10.1016/j.jnca.2018.02.009https://doi.org/10.1016/j.jnca.2018.02.009
Lewko A, Waters B (2011) Decentralizing attribute-based encryption. In: Advances in cryptology – EUROCRYPT 2011. Springer, pp 568–588. https://doi.org/10.1007/978-3-642-20465-4_31
Li J, Lin X, Zhang Y, Han J (2017) Ksf-oabe: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Services Comput:715–725. https://doi.org/10.1109/TSC.2016.2542813https://doi.org/10.1109/TSC.2016.2542813
Li J, Yao W, Han J, Zhang Y, Shen J (2018) User collusion avoidance cp-abe with efficient attribute revocation for cloud storage. IEEE Syst J, 1767–1777. https://doi.org/10.1109/JSYST.2017.2667679
Li J, Yao W, Zhang Y, Qian H, Han J (2017) Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans Services Comput:785–796. https://doi.org/10.1109/TSC.2016.2520932
Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distributed Syst, pp 131–143. https://doi.org/10.1109/TPDS.2012.97
Liu Z, Jiang ZL, Wang X, Yiu S (2018) Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating. J Netw Comput Appl:112–123. https://doi.org/10.1016/j.jnca.2018.01.016https://doi.org/10.1016/j.jnca.2018.01.016
Pirretti M, Traynor P, McDaniel P, Waters B (2006) Secure attribute-based systems. In: Proceedings of the 13th ACM conference on computer and communications security, CCS ’06, ACM, pp 99–112. https://doi.org/10.1145/1180405.1180419
Sahai A, Seyalioglu H, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Advances in Cryptology –CRYPTO 2012, Springer, pp 199–217. https://doi.org/10.1007/978-3-642-32009-5_13
Shamir A (1985) Identity-based cryptosystems and signature schemes. In: Advances in Cryptology, Springer, pp 47–53. https://doi.org/10.1007/3-540-39568-7_5
Shi Y, Zheng Q, Liu J, Han Z (2015) Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Inf Sci:221–231. https://doi.org/10.1016/j.ins.2014.10.020
Tysowski PK, Hasan MA (2013) Hybrid attribute- and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE Trans Cloud Comput, pp 172–186. https://doi.org/10.1109/TCC.2013.11
Vipul G, Omkant P, Amit S (2006) Attribute-based encryption for fine-grained access control of encrypted data. ACM Conf on Comput Comm Secur, pp 89–98. https://doi.org/10.1145/1180405.1180418
Watanabe Y, Emura K, Seo JH (2017) New revocable ibe in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters. In: Topics in Cryptology – CT-RSA 2017, Springer International Publishing, pp 432–449
Waters B (2005) Efficient identity-based encryption without random oracles. In: Advances in cryptology – EUROCRYPT 2005, Springer, pp 114–127. https://doi.org/10.1007/11426639_7
Wei J, Liu W, Hu X (2018) Secure and efficient attribute-based access control for multiauthority cloud storage. IEEE Syst J, 1731–1742. https://doi.org/10.1109/JSYST.2016.2633559
Wei J, Liu W, Hu X (2018) Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Trans Cloud Comput, pp 1136–1148. https://doi.org/10.1109/TCC.2016.2545668
Xu S, Yang G, Mu Y (2019) Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Inf Sci:116–134. https://doi.org/10.1016/j.ins.2018.11.031
Xu S, Yang G, Mu Y (2019) A secure iot cloud storage system with fine-grained access control and decryption key exposure resistance. Future Generation Comput Syst:284–294. https://doi.org/10.1016/j.future.2019.02.051
Xu S, Yang G, Mu Y, Deng RH (2018) Secure fine-grained access control and data sharing for dynamic groups in the cloud. IEEE Trans Inf Forensics Secur:2101–2113. https://doi.org/10.1109/TIFS.2018.2810065
Yang K, Han Q, Li H, Zheng K, Su Z, Shen X (2017) An efficient and fine-grained big data access control scheme with privacy-preserving policy. IEEE Int Things J:563–571. https://doi.org/10.1109/JIOT.2016.2571718
Yang K, Jia X, Ren K (2013) Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security, ASIA CCS ’13, ACM, pp 523–528
Yin H, Zhang J, Xiong Y, Ou L, Li F, Liao S, Li K (2019) Cp-abse: a ciphertext-policy attribute-based searchable encryption scheme. IEEE Access:5682–5694. https://doi.org/10.1109/ACCESS.2018.2889754
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp 1–9. https://doi.org/10.1109/INFCOM.2010.5462174
Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput:126–138. https://doi.org/10.1109/TC.2013.200
Acknowledgements
This work was supported in part by the National Key R&D Program of China (No. 2018YFB1003205) and the National Natural Science Foundation of China (No. 61972143).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Deng, S., Yang, G., Dong, W. et al. Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation. Multimed Tools Appl 82, 22251–22274 (2023). https://doi.org/10.1007/s11042-022-13537-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13537-0