Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data

Yanjiang Yang*, Joseph K. Liu, Kaitai Liang, Kim Kwang Raymond Choo, Jianying Zhou

*Corresponding author for this work

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

85 Citations (Scopus)

Abstract

Attribute-based encryption has the potential to be deployed in a cloud computing environment to provide scalable and fine-grained data sharing. However, user revocation within ABE deployment remains a challenging issue to overcome, particularly when there is a large number of users. In this work, we introduce an extended proxy-assisted approach, which weakens the trust required of the cloud server. Based on an all-or-nothing principle, our approach is designed to discourage a cloud server from colluding with a third party to hinder the user revocation functionality. We demonstrate the utility of our approach by presenting a construction of the proposed approach, designed to provide efficient cloud data sharing and user revocation. A prototype was then implemented to demonstrate the practicality of our proposed construction.

Original languageEnglish
Title of host publicationComputer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings
EditorsGünther Pernul, Peter Y.A. Ryan, Edgar Weippl
PublisherSpringer
Pages146-166
Number of pages21
ISBN (Print)9783319241760
DOIs
Publication statusPublished - 1 Jan 2015
Externally publishedYes
Event20th European Symposium on Research in Computer Security, ESORICS 2015 - Vienna, Austria
Duration: 21 Sept 201525 Sept 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9327
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference20th European Symposium on Research in Computer Security, ESORICS 2015
Country/TerritoryAustria
CityVienna
Period21/09/1525/09/15

Fingerprint

Dive into the research topics of 'Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data'. Together they form a unique fingerprint.

Cite this