ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Decentralized Firewall for Attribute-Based Encryption with Verifiable and Revocable Cloud Access Control

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 10)

Publication Date:

Authors : ; ; ;

Page : 165-173

Keywords : Access Control; Multi-Authority; CP-ABE; Attribute Revocation; Cloud Storage; Data Sharing; Decryption Outsourcing; Verifiability; Multi-receiver Identity-based Encryption;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The most difficult issues in data outsourcing are the requirement of authorization policies and the revocation of policy updates. In all current Ciphertext-Policy Attribute-Based Encryption (CP-ABE) schemes, it is expected that there is an Attribute Authority (AA) in the system to issuing attributes to the users. CP-ABE is a promising cryptographic answer for these issues for authorizing access control approaches characterized by a data owner on outsourced data. Be that as it may, it is hard to specifically apply existing CP-ABE plans to data access control for cloud storage frameworks on account of the attribute revocation issue. In numerous applications, there are various authorities exist together in a framework and every authority has the capacity to issue attributes independently. In this paper, we outline an access control structure for multi-authority frameworks and propose an efficient and secure multi-authority access control scheme for cloud storage. We first outline an efficient multi-authority CP-ABE scheme that does not oblige a global authority and can bolster any Linear Secret Sharing Scheme (LSSS) access structure. At that point, we demonstrate its security in the random oracle model. In particular, we propose a revocable multi-authority CP-ABE scheme, and apply it as the fundamental systems to outline the data access control scheme. The analysis results show that the proposed multi-authority access control scheme is scalable, efficient and secure in the data outsourcing systems.

Last modified: 2021-07-01 14:25:16