TY - GEN
T1 - Extended proxy-assisted approach
T2 - 20th European Symposium on Research in Computer Security, ESORICS 2015
AU - Yang, Yanjiang
AU - Liu, Joseph K.
AU - Liang, Kaitai
AU - Choo, Kim Kwang Raymond
AU - Zhou, Jianying
PY - 2015/1/1
Y1 - 2015/1/1
N2 - Attribute-based encryption has the potential to be deployed in a cloud computing environment to provide scalable and fine-grained data sharing. However, user revocation within ABE deployment remains a challenging issue to overcome, particularly when there is a large number of users. In this work, we introduce an extended proxy-assisted approach, which weakens the trust required of the cloud server. Based on an all-or-nothing principle, our approach is designed to discourage a cloud server from colluding with a third party to hinder the user revocation functionality. We demonstrate the utility of our approach by presenting a construction of the proposed approach, designed to provide efficient cloud data sharing and user revocation. A prototype was then implemented to demonstrate the practicality of our proposed construction.
AB - Attribute-based encryption has the potential to be deployed in a cloud computing environment to provide scalable and fine-grained data sharing. However, user revocation within ABE deployment remains a challenging issue to overcome, particularly when there is a large number of users. In this work, we introduce an extended proxy-assisted approach, which weakens the trust required of the cloud server. Based on an all-or-nothing principle, our approach is designed to discourage a cloud server from colluding with a third party to hinder the user revocation functionality. We demonstrate the utility of our approach by presenting a construction of the proposed approach, designed to provide efficient cloud data sharing and user revocation. A prototype was then implemented to demonstrate the practicality of our proposed construction.
UR - http://www.scopus.com/inward/record.url?scp=84951824554&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-24177-7_8
DO - 10.1007/978-3-319-24177-7_8
M3 - Conference contribution
AN - SCOPUS:84951824554
SN - 9783319241760
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 146
EP - 166
BT - Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings
A2 - Pernul, Günther
A2 - Ryan, Peter Y.A.
A2 - Weippl, Edgar
PB - Springer
Y2 - 21 September 2015 through 25 September 2015
ER -