A cloud-based access control scheme with user revocation and attribute update

Peng Zhang*, Zehong Chen, Kaitai Liang, Shulan Wang, Ting Wang

*Corresponding author for this work

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

36 Citations (Scopus)

Abstract

Ciphertext-policy attribute-based encryption (CP-ABE) is a well-known cryptographic technology for guaranteeing data confidentiality but also fine-grained data access control. It enables data owners to define flexible access policy for cloud-based data sharing. However, the user revocation and attribute update problems existing in CP-ABE systems that are long-standing unsolved in the literature. In this paper, we propose the first access control (CP-ABE) scheme supporting user revocability and attribute update. Specifically, the user revocation is defined in the identity-based setting that does not conflict our attribute-based design. The cost brought by attribute update is efficient in the sense that we only concentrate on the update of the ciphertexts associated with the corresponding updated attribute. Moreover, the security analysis shows that the proposed scheme is secure under the decisional Bilinear Diffie-Hellman assumption.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings
EditorsJoseph K. Liu, Ron Steinfeld
PublisherSpringer
Pages525-540
Number of pages16
ISBN (Print)9783319402529
DOIs
Publication statusPublished - 1 Jan 2016
Externally publishedYes
Event21st Australasian Conference on Information Security and Privacy, ACISP 2016 - Melbourne, Australia
Duration: 4 Jul 20166 Jul 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9722
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference21st Australasian Conference on Information Security and Privacy, ACISP 2016
Country/TerritoryAustralia
CityMelbourne
Period4/07/166/07/16

Keywords

  • Access control
  • Attribute update
  • Attribute-based encryption
  • Cloud
  • User revocability

Fingerprint

Dive into the research topics of 'A cloud-based access control scheme with user revocation and attribute update'. Together they form a unique fingerprint.

Cite this