CP-ABE Scheme With User Revocation For Cloud Storage System

K. RamaKrishna, Ch. Subhash

Abstract


We give a (CP-ABE) plot with proficient client renouncement for distributed storage framework. The issue of client disavowal can be understood proficiently by presenting the idea of client group. At the point when any client leaves, the gathering administrator will refresh clients' private keys aside from the individuals who have been renounced. Also, CP-ABE plot has substantial calculation cost, as it develops directly with the multifaceted nature for the get to structure. To lessen the calculation cost, we outsource high calculation load to cloud specialist co-ops without spilling record substance and secret keys. Notbaly, our plan can withstand plot assault performed by denied clients coordinating with existing clients. We demonstrate the security of our plan under the distinct calculation Diffie-Hellman (DCDH) supposition.


References


A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,”EUROCRYPT’05, LNCS, vol. 3494, pp. 457-473, 2005.

J.Bethencourt, A.Sahai and B.Waters, “Ciphertext-Policy Attribute-BasedEncryption,”Proc. IEEE Symposium on Security and Privacy, pp.321-334, May 2007, doi: 10.1109/SP.2007.11.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based En-cryption for Fine-Grained Access Control of Encrypted Data,”Proc.13th ACM Conference on Computer and Communications Security (CCS ’06), pp. 89-98, 2006, doi:10.1145/1180405.1180418.

D. Boneh and M.K. Franklin,“Identity-Based Encryption from the Weil Pairing,” SIAM Journal of Computing, vol. 32, no. 3, pp. 586-615, 2003.

A. Boldyreva, V. Goyal, and V. Kumar,“Identity-Based En-cryption with Efficient Revocation,”Proc.15th ACM conference on Computer and communications security (CCS ’ 08),pp. 417-426,2008.

S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based Data Sharing with Attribute Revocation,”Proc.5th ACM Symposium on Information, Computer and Communications Security (ASIACCS’ 10), pp. 261-270, 2010.

M. Yang, F. Liu, J. Han, and Z. Wang, “An Efficient Attribute based Encryption Scheme with Revocation for Outsourced Data Sharing Control,” Proc.2011International Conference on Instru-mentation, Measurement, Computer, Communication and Control,pp. 516-520,2011.

P.K. Tysowski and M.A. Hasan,“Hybrid Attribute-Based Encryption and Re-Encryption for Scalable Mobile Applica-tionsin Clouds,” IEEE Transactions onCloudComputing, pp. 172-186, 2013.

J. Hur and D. K. Noh,“Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,”IEEE Transactions onParallel and Distributed Systems, pp. 1214-1221,2011.

S. Yu, C. Wang, K. Ren, and W. Lou,“Achieving Secure, Scal-able, and Fine-Grained Data Access Control in Cloud Compu-ting,”Proc. of IEEE INFOCOM’10,pp. 1-9,2010.

M. Green, S. Hohenbergerand B. Waters, “Outsourcing the decryp-tion of ABE ciphertexts,”Proc.20th USENIX Conference on Security(SEC ’11), pp. 34, 2011.

J. Li, X.F. Chen, J.W. Li, C.F. Jia, J.F. Maand W.J. Lou, “Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryp-tion,”Proc.18th European Symposium on Research in Computer Security(ESORICS ’13),LNCS8134,Berlin: Springer-Verlag, pp. 592-609, 2013.

J.W. Li, C.F. Jia, J. Liand X.F. Chen, “Outsourcing Encryption of At-tribute-Based Encryption with Mapreduce,”Proc.14th International ConferenceonInformation and Communications Security(ICICS12),LNCS7618,Berlin:Springer-Verlag, pp. 191-201, 2012.doi:10.1007/978-3-642-34129-8_17

M.Chase, “Multi-authority Attribute Based Encryption,”Proc.4th Theory of Cryptography Conference(TCC ’07), LNCS4392,Berlin:Springer-Verlag, pp. 515-534, 2007.

Z. Liu, Z. Cao, Q. Huang, D. S. Wongand T. H. Yuen, “Fully Secure Multi-Authority Ciphertext-Policy Attribute-Based Encryption with-out Random Oracles,”Proc.16th European Symposium on Research in Computer Security(ESORICS ’11), LNCS6879, Berlin:Springer-Verlag, pp. 278-297, 2011.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.