Cargando…

Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage

In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribute can thus be shared by many users who all possess the attribute. For monetary gain, a malicious aut...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Shangping, Guo, Keke, Zhang, Yaling
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6136790/
https://www.ncbi.nlm.nih.gov/pubmed/30212473
http://dx.doi.org/10.1371/journal.pone.0203225
_version_ 1783355071411519488
author Wang, Shangping
Guo, Keke
Zhang, Yaling
author_facet Wang, Shangping
Guo, Keke
Zhang, Yaling
author_sort Wang, Shangping
collection PubMed
description In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribute can thus be shared by many users who all possess the attribute. For monetary gain, a malicious authorized user may reveal his/her decryption key to a third party, and it is difficult to trace the owner of primitive secret key from an exposed key. At the same time, this situation may also limit commercial applications of CP-ABE systems. To solve these problems and enable fine-grained access control for the encrypted data, we propose a traceable CP-ABE scheme with attribute-level user revocation for cloud storage (TUR-CPABE). Our scheme enjoys four advantages. First, it has the ability to trace malicious users who have leaked key information from the system. Second, it supports attribute-level user revocation for malicious users and allows ABE fine-grained access control. Third, it allows secret key updates and ciphertext updates to resist collusion attacks between users. Fourth, outsourcing encryption, decryption and attribute revocation are used to reduce the computational burden on data owners, data users and the trust authority, respectively. In addition, our scheme has been proven to be secure against chosen plaintext attacks under a selective access policy based on decisional q – BDHE assumption in the standard model.
format Online
Article
Text
id pubmed-6136790
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-61367902018-09-27 Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage Wang, Shangping Guo, Keke Zhang, Yaling PLoS One Research Article In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribute can thus be shared by many users who all possess the attribute. For monetary gain, a malicious authorized user may reveal his/her decryption key to a third party, and it is difficult to trace the owner of primitive secret key from an exposed key. At the same time, this situation may also limit commercial applications of CP-ABE systems. To solve these problems and enable fine-grained access control for the encrypted data, we propose a traceable CP-ABE scheme with attribute-level user revocation for cloud storage (TUR-CPABE). Our scheme enjoys four advantages. First, it has the ability to trace malicious users who have leaked key information from the system. Second, it supports attribute-level user revocation for malicious users and allows ABE fine-grained access control. Third, it allows secret key updates and ciphertext updates to resist collusion attacks between users. Fourth, outsourcing encryption, decryption and attribute revocation are used to reduce the computational burden on data owners, data users and the trust authority, respectively. In addition, our scheme has been proven to be secure against chosen plaintext attacks under a selective access policy based on decisional q – BDHE assumption in the standard model. Public Library of Science 2018-09-13 /pmc/articles/PMC6136790/ /pubmed/30212473 http://dx.doi.org/10.1371/journal.pone.0203225 Text en © 2018 Wang et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Wang, Shangping
Guo, Keke
Zhang, Yaling
Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage
title Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage
title_full Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage
title_fullStr Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage
title_full_unstemmed Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage
title_short Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage
title_sort traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6136790/
https://www.ncbi.nlm.nih.gov/pubmed/30212473
http://dx.doi.org/10.1371/journal.pone.0203225
work_keys_str_mv AT wangshangping traceableciphertextpolicyattributebasedencryptionschemewithattributeleveluserrevocationforcloudstorage
AT guokeke traceableciphertextpolicyattributebasedencryptionschemewithattributeleveluserrevocationforcloudstorage
AT zhangyaling traceableciphertextpolicyattributebasedencryptionschemewithattributeleveluserrevocationforcloudstorage