Traitor Traceable and Revocation-oriented Attribute Based Encryption with Proxy Decryption for Cloud Devices

PDF (1635KB), PP.37-52

Views: 0 Downloads: 0

Author(s)

G. Sravan Kumar 1,* A. Sri Krishna 2

1. Department of Computer Science and Engineering, ANU College of Engineering, Acharya Nagarjuna University, Guntur, Andhra Pradesh, 522510, India

2. Department of Information Technology, RVR & JC College of Engineering, Acharya Nagarjuna University, Guntur, Andhra Pradesh, 522510, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2024.03.04

Received: 17 Mar. 2021 / Revised: 6 Aug. 2021 / Accepted: 23 Apr. 2024 / Published: 8 Jun. 2024

Index Terms

Attribute Based Encryption, Large Universe, Traitor Traceability, Attribute Revocation, Ciphertext Updation

Abstract

Cloud storage environment permits the data holders to store their private data on remote cloud computers. Ciphertext Policy Attribute Based Encryption (CP-ABE) is an advanced method that assigns fine-grained access control and provides data confidentiality for accessing the cloud data. CP-ABE methods with small attribute universe limit the practical application of CP-ABE as the public parameter length linearly increases with the number of attributes. Further, it is necessary to provide a way to perform complex calculations during decryption on outsourced devices. In addition, the state-of-art techniques found it difficult to trace the traitor as well as revoke their attribute due to the complexity of ciphertext updation. In this paper, a concrete construction of CP-ABE technique has been provided to address the above limitations. The proposed technique supports large attribute universe, proxy decryption, traitor traceability, attribute revocation and ciphertext updation. The proposed scheme is proven to be secure under random oracle model. Moreover, the experimental outcomes reveal that our scheme is more time efficient than the existing schemes in terms of computation cost.

Cite This Paper

G. Sravan Kumar, A. Sri Krishna, "Traitor Traceable and Revocation-oriented Attribute Based Encryption with Proxy Decryption for Cloud Devices", International Journal of Computer Network and Information Security(IJCNIS), Vol.16, No.3, pp.37-52, 2024. DOI:10.5815/ijcnis.2024.03.04

Reference

[1]P. K. Premkamal, S. K. Pasupuleti, and P. J. A. Alphonse, “A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud,” Journal of Ambient Intelligence and Humanized Computing, vol. 10, pp. 2693-2707, 2018, doi: 10.1007/s12652-018-0967-0.
[2]X. Yongliang, J. Chunhua, Q. Wenyu, S. Jinsong, J. Ying, “Secure fuzzy identity-based public verification for cloud storage,” Journal of Systems Architecture, vol. 128, 2022, doi: 10.1016/j.sysarc.2022.102558.
[3]L. Xiaofeng, F. Songbing, J. Cheng, and L. Pietro, “A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain,” Security and Communication Networks, vol. 2021, 2021, doi: 10.1155/2021/5308206.
[4]K.N. Ambili, and J. Jimmy, “Ensuring Accountability and Outsourced Decryption in IoT Systems using Ciphertext-Policy Attribute-Based Encryption,” Cryptology ePrint Archive, vol. 2021, 2021, https://eprint.iacr.org/2022/040.
[5]P.Chinnasamy, P. Deepalakshmi, A. K. Dutta, J. You, G.P. Joshi, “Ciphertext-Policy Attribute-Based Encryption for Cloud Storage: Toward Data Privacy and Authentication in AI-Enabled IoT System,” Mathematics, vol. 10, no. 1, 2022, doi: 10.3390/ math10010068.
[6]S. Ma, J. Lai, R. H. Deng, and X. Ding, “Adaptable key-policy attribute-based encryption with time interval,” Soft Computing, vol. 21, no. 20, 2017, pp.6191-6200. doi: 10.1007/s00500-016-2177-z.
[7]J. Li, Q. Yu, Y. Zhang, and J. Shen, “Key-Policy Attribute-Based Encryption against Continual Auxiliary Input Leakage,” Information Sciences, vol. 470, 2018, pp. 175-188, doi: 10.1016/j.ins.2018.07.077.
[8]Y. Seongwon, J. K. Eshraghian, H. C. Iu, and K. Cho, “Low-Power Wireless Sensor Network Using Fine-Grain Control of Sensor Module Power Mode,” Sensors, vol. 21, no. 9, 2021, https://doi.org/10.3390/s21093198
[9]F. Luo, S. Al-Kuwari, F. Wang, and K. Chen, “Attribute-based proxy re-encryption from standard lattices,” Theoretical Computer Science, vol. 865, pp. 52–62, 2021, doi:10.1016/j.tcs.2021.02.036.
[10]S. S. D. Mohd, M. Hussin, Z. M. Hanapi, M. A. Mohamed, “Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption,” Future Internet, vol. 13, no. 11, 2021, doi: 10.3390/fi13110279.
[11]E. G. Hassan, T. Ahmed, “Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption,” Security and Communication Networks, vol. 2021, 2021, doi: 10.1155/2021/8834616.
[12]H. Kwon, D. Kim, C. Hahn, and J. Hur, “Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks,” Multimedia Tools and Applications, vol. 76, no. 19, pp.19507-19521, 2017, doi: 10.1007/s11042-015-3187-z.
[13]S. Luo, “User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption,” Security and Communication Networks, vol. 2021, 2021, doi: 10.1155/2021/6617669
[14]T. Wang, Y. Zhou, H.  Ma, R. Zhang, “Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud,” The Computer Journal, 2022, doi: 10.1093/comjnl/bxac024.
[15]Y. Zhang, D. Zheng, and R. H. Deng, “Security and privacy in smart health: efficient policy-hiding attribute-based access control,” IEEE Internet of Things Journal, vol. 5, no. 3, pp.2130-2145, 2018, doi: 10.1109/JIOT.2018.2825289
[16]B. Qin, Q. Zhao, and D. Zheng, “Bounded Revocable and Outsourceable ABE for Secure Data Sharing,” The Computer Journal, vol. 61, no. 8, pp.1259-1268, 2018, doi: 10.1093/comjnl/bxy063.
[17]P. Li, J. Li, Z. Huang, C. Z. Gao, W. B. Chen, and K. Chen, “Privacy-preserving outsourced classification in cloud computing,” Cluster Computing, vol. 21, pp.277-286, 2017, doi: 10.1007/s10586-017-0849-9.
[18]M. Bouchaala, C. Ghazel, and L. A. Saidane, “TRAK-CPABE: A novel Traceable, Revocable and Accountable Ciphertext-Policy Attribute-Based Encryption scheme in cloud computing,” Journal of Information Security and Applications, vol. 61, 2021, doi: 10.1016/j.jisa.2021.102914.
[19]Z. Liu, S. Duan, P. Zhou, and B. Wang, “Traceable-then-revocable ciphertext-policy attribute-based encryption scheme,” Future Generation Computer Systems, vol. 93, pp. 903-913, 2017, doi: 10.1016/j.future.2017.09.045.
[20]K. Huang, “Secure efficient revocable large universe multi-authority attribute-based encryption for cloud-aided IoT,” IEEE Access, vol. 9, pp.53576-53588, 2021, doi: 10.1109/ACCESS.2021.3070907.
[21]J. Zhou, H. Duan, K. Liang, Q. Yan, F. Chen, F. R. Yu, J. Wu, and J. Chen, “Securing outsourced data in the multi-authority cloud with fine-grained access control and efficient attribute revocation,” The Computer Journal, vol. 60, no. 8, pp.1210-1222, 2017, doi: 10.1093/comjnl/bxx017.
[22]L. Xue, Y. Yu, Y. Li, M. H. Au, X. Du, and B. Yang, “Efficient attribute-based encryption with attribute revocation for assured data deletion,” Information Sciences, vol. 479, pp. 640-650, 2018, doi: 10.1016/j.ins.2018.02.015
[23]H. Zhong, W. Zhu, Y. Xu, and J. Cui, “Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage,” Soft Computing, vol. 22, no. 1, pp.243-251, 2018, doi: 10.1007/s00500-016-2330-8
[24]S. P. P. Kumar, “Enriching Controlled Information Sharing in Healthcare Systems using Attribute based Encryption with Break-Glass Policy,” Journal of Excellence in Computer Science and Engineering, vol. 4, no. 2, pp. 35-41, 2018, doi: 10.18831/djcse.in/2018021004
[25]L. J. Xu, R. Hao, J. Yu, and P. Vijayakumar, “Secure deduplication for big data with efficient dynamic ownership updates,” Computers & Electrical Engineering, vol. 96, 2021, doi: 10.1016/j.compeleceng.2021.107531
[26]H. Wang, Z. Zheng, L. Wu, and P. Li, “New directly revocable attribute-based encryption scheme and its application in cloud storage environment,” Cluster Computing, vol. 20, no. 3, pp.2385-2392, 2017, doi: 10.1007/s10586-016-0701-7
[27]H. Aqeel, and S. T. Ali, “A Provable and User Revocable Ciphertext-Policy Attribute-Based Encryption with Updatable Ciphertext,” in Innovations in Computer Science and Engineering, In: Saini, H., Sayal, R., Govardhan, A., Buyya, R. (eds), Singapore, Springer, 2019, pp. 391-399
[28]J. Cui, H. Zhou, H. Zhong, and Y. Xu, “AKSER: Attribute-based keyword search with efficient revocation in cloud computing,” Information Sciences, vol. 423, pp.343-352, 2018, doi: 10.1016/j.ins.2017.09.029
[29]M. Chase, “Multi-authority Attribute Based Encryption,” in Theory of Cryptography, In: Vadhan, S.P. (eds), Berlin, Heidelberg, Springer, 2007, pp.515-534.
[30]H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,” Information Sciences, vol. 180, no. 13, pp.2618-2632, 2010, doi: 10.1016/j.ins.2010.03.004
[31]X. L. Xu, Q.T. Zhang, and J. L. Zhou, “NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems,” Journal of Central South University, vol. 24, no. 4, pp. 807-818, 2017, doi: 10.1007/s11771-017-3483-z.
[32]S. Belguith, N. Kaaniche, M. Laurent, A. Jemai, and R. Attia, “PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT,” Computer Networks, vol. 133, pp.141-156, 2018, doi: 10.1016/j.comnet.2018.01.036.
[33]C. Li, Y. Fang, X. Zhang, C. Jin, Q. Shen, Z. Wu, “A practical construction for large universe hierarchical attribute‐based encryption,” Concurrency and Computation Practice Experience, vol. 29, no. 17, 2017, doi:10.1002/cpe.3957.
[34]K. Zhang, H. Li, J. Ma, and X. Liu, “Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability,” Science China Information Sciences, vol. 61, no. 3, 2018, doi: 10.1007/s11432-016-9019-8.
[35]Z. Liu, Z. Cao, and D. S. Wong, “White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp.76-88, 2013, doi: 10.1109/TIFS.2012.2223683.
[36]J. Ning, Z. Cao, X. Dong, and L. Wei, “White-box traceable CP-ABE for cloud storage service: How to catch people leaking their access credentials effectively,” IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 5, pp.883-897, 2018, doi: 10.1109/TDSC.2016.2608343.
[37]D. Tiwari, and G. R. Gangadharan, “SecCloudSharing: Secure data sharing in public cloud using ciphertext‐policy attribute‐based proxy re‐encryption with revocation,” International Journal of Communication Systems, vol. 31, no. 5, 2018, doi: 10.1002/dac.3494.
[38]P. Zhang, Z. Chen, J. K. Liu, K. Liang, and H. Liu, “An efficient access control scheme with outsourcing capability and attribute update for fog computing,” Future Generation Computer Systems, vol. 78, pp.753-762, 2018, doi: 10.1016/j.future.2016.12.015.
[39]S. Fugkeaw, and H. Sato, “Scalable and secure access control policy update for outsourced big data,” Future Generation Computer Systems, vol. 79, pp. 364-373, 2018, doi: 10.1016/j.future.2017.06.014.
[40]J. Sun, Y. Yang, Z. Liu, Y. Qiao, “Multi-Authority Criteria-Based Encryption Scheme for IoT,” Security and Communication Networks, vol. 2021, 2021, doi: 10.1155/2021/9174630.