Skip to main content
Erschienen in: The Journal of Supercomputing 6/2022

03.01.2022

Blockchain-based cloud storage system with CP-ABE-based access control and revocation process

verfasst von: Pratima Sharma, Rajni Jindal, Malaya Dutta Borah

Erschienen in: The Journal of Supercomputing | Ausgabe 6/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud system provides an on-demand and low-cost computing and storing model. Many organizations and individual end-users are using cloud storage services to back up their crucial data. However, this storage utility suffers from various threats and security issues. Before outsourcing the data to the cloud server, some data security measures should be imposed to ensure security. The blockchain is an advanced technology that stores data in a distributed manner and provides a more secure environment. Therefore, we propose a blockchain-based framework with the Ciphertext Policy Attribute-based Encryption algorithm to provide access control and user revocation methods in the cloud storage system to resolve the above issues. Our scheme offers three main features to provide a secure environment. First, a java-based blockchain network is designed to register data owners and attribute authority using a key generation algorithm. Second, the data owners and attribute authorities store the public information in the blockchain structure, set access policies, and generate the user’s secret key to resolve key escrow problems. Third, the immediate attribute modification is deployed to attain fine-grained access control with the user revocation process. The experimental results, analysis, and performance evaluation show that our scheme provides a feasible and reliable environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Azhir E, Navimipour NJ, Hosseinzadeh M, Sharifi A, Darwesh A (2019) Query optimization mechanisms in the cloud environments: a systematic study. Int J Commun Syst 32(8):e3940CrossRef Azhir E, Navimipour NJ, Hosseinzadeh M, Sharifi A, Darwesh A (2019) Query optimization mechanisms in the cloud environments: a systematic study. Int J Commun Syst 32(8):e3940CrossRef
2.
Zurück zum Zitat Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115CrossRef Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115CrossRef
3.
Zurück zum Zitat Shin Y, Koo D, Hur J (2017) A survey of secure data deduplication schemes for cloud storage systems. ACM Comput Surv 49(4):1–38CrossRef Shin Y, Koo D, Hur J (2017) A survey of secure data deduplication schemes for cloud storage systems. ACM Comput Surv 49(4):1–38CrossRef
4.
Zurück zum Zitat Du M, Wang Q, He M, Weng J (2018) Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans Inf Forensics Secur 13(9):2320–2332CrossRef Du M, Wang Q, He M, Weng J (2018) Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans Inf Forensics Secur 13(9):2320–2332CrossRef
5.
Zurück zum Zitat Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61CrossRef Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61CrossRef
7.
Zurück zum Zitat Kaaniche N, Laurent M (2017) Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput Commun 111:120–141CrossRef Kaaniche N, Laurent M (2017) Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput Commun 111:120–141CrossRef
8.
Zurück zum Zitat Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115CrossRef Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115CrossRef
9.
Zurück zum Zitat Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Yi (2018) Cloud aided lightweight certificate less authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123CrossRef Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Yi (2018) Cloud aided lightweight certificate less authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123CrossRef
12.
Zurück zum Zitat Kofahi NA, Al-Rabadi AR (2018) Identifying the top threats in cloud computing and its suggested solutions: a survey. Networks 6(1):1–13MathSciNet Kofahi NA, Al-Rabadi AR (2018) Identifying the top threats in cloud computing and its suggested solutions: a survey. Networks 6(1):1–13MathSciNet
13.
Zurück zum Zitat Zyskind G, Nathan O, et al (2015) Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops (SPW). IEEE, pp 180–184 Zyskind G, Nathan O, et al (2015) Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops (SPW). IEEE, pp 180–184
14.
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2008) Ciphertext-policy attribute-based encryption. In: Proceeding of the IEEE Symposium on Security and Privacy (SP), pp 321–334 Bethencourt J, Sahai A, Waters B (2008) Ciphertext-policy attribute-based encryption. In: Proceeding of the IEEE Symposium on Security and Privacy (SP), pp 321–334
15.
Zurück zum Zitat Namasudra S, Deka GC, Johri P, Hosseinpour M, Gandomi AH (2021) The revolution of blockchain: state-of-the-art and research challenges. Arch Comput Methods Eng 28(3):1497–1515CrossRef Namasudra S, Deka GC, Johri P, Hosseinpour M, Gandomi AH (2021) The revolution of blockchain: state-of-the-art and research challenges. Arch Comput Methods Eng 28(3):1497–1515CrossRef
16.
Zurück zum Zitat Sharma P, Jindal R, Borah MD (2020) Blockchain technology for cloud storage: a systematic literature review. ACM Comput Surv 53(4):1–32CrossRef Sharma P, Jindal R, Borah MD (2020) Blockchain technology for cloud storage: a systematic literature review. ACM Comput Surv 53(4):1–32CrossRef
17.
Zurück zum Zitat Meng W, Tischhauser E, Wang Q, Wang Y, Han J (2018) When intrusion detection meets blockchain technology: a review. IEEE Access 6:10179–10188CrossRef Meng W, Tischhauser E, Wang Q, Wang Y, Han J (2018) When intrusion detection meets blockchain technology: a review. IEEE Access 6:10179–10188CrossRef
18.
Zurück zum Zitat Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Yi (2018) An id-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640CrossRef Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Yi (2018) An id-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640CrossRef
19.
Zurück zum Zitat Sharma P, Jindal R, Borah MD (2021) Blockchain-based decentralized architecture for cloud storage system. J Inf Secur Appl 62:1–15 Sharma P, Jindal R, Borah MD (2021) Blockchain-based decentralized architecture for cloud storage system. J Inf Secur Appl 62:1–15
20.
Zurück zum Zitat Mohajer A, Barari M, Zarrabi H (2018) Big data-based self-optimization networking: a novel approach beyond cognition. Intell Autom Soft Comput 24(2):413–420CrossRef Mohajer A, Barari M, Zarrabi H (2018) Big data-based self-optimization networking: a novel approach beyond cognition. Intell Autom Soft Comput 24(2):413–420CrossRef
21.
Zurück zum Zitat Masdari M, Ahmadzadeh S, Bidaki M (2017) Key management in wireless body area network: challenges and issues. J Netw Comput Appl 91:36–51CrossRef Masdari M, Ahmadzadeh S, Bidaki M (2017) Key management in wireless body area network: challenges and issues. J Netw Comput Appl 91:36–51CrossRef
22.
Zurück zum Zitat Mohajer A, Bavaghar M, Farrokhi H (2020) Mobility-aware load balancing for reliable self-organization networks: multi-agent deep reinforcement learning. Reliab Eng Syst Saf 202:107056CrossRef Mohajer A, Bavaghar M, Farrokhi H (2020) Mobility-aware load balancing for reliable self-organization networks: multi-agent deep reinforcement learning. Reliab Eng Syst Saf 202:107056CrossRef
23.
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (eds) Advances in cryptology—EUROCRYPT. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 3494, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (eds) Advances in cryptology—EUROCRYPT. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 3494, pp 457–473
24.
Zurück zum Zitat Attrapadung N, Imai H (2009) Attribute-based encryption supporting direct/indirect revocation modes. In: Parker MG (eds) Cryptography and Coding, IMACC, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 5921, pp 278–300 Attrapadung N, Imai H (2009) Attribute-based encryption supporting direct/indirect revocation modes. In: Parker MG (eds) Cryptography and Coding, IMACC, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 5921, pp 278–300
25.
Zurück zum Zitat Attrapadung N, Libert B, de Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) Public Key Cryptography—PKC 2011, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 6571, pp 90–108 Attrapadung N, Libert B, de Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) Public Key Cryptography—PKC 2011, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 6571, pp 90–108
26.
Zurück zum Zitat Masdari M, Jabbehdari S, Ahmadi MR, Hashemi SM, Bagherzadeh J, Khadem-Zadeh A (2011) A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks. EURASIP J Wirel Commun Netw 112:1–12 Masdari M, Jabbehdari S, Ahmadi MR, Hashemi SM, Bagherzadeh J, Khadem-Zadeh A (2011) A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks. EURASIP J Wirel Commun Netw 112:1–12
27.
Zurück zum Zitat Masdari M, Bidaki M, Naghiloo F (2017) Comprehensive evaluation of the localized certificate revocation in mobile ad hoc network. Wireless Pers Commun 94:977–1001CrossRef Masdari M, Bidaki M, Naghiloo F (2017) Comprehensive evaluation of the localized certificate revocation in mobile ad hoc network. Wireless Pers Commun 94:977–1001CrossRef
29.
Zurück zum Zitat Datta P, Dutta R, Mukhopadhyay S (2015) General circuit realizing compact revocable attribute-based encryption from multilinear maps. In: ISC, vol 9290 of LNCS. Springer, pp 336–354 Datta P, Dutta R, Mukhopadhyay S (2015) General circuit realizing compact revocable attribute-based encryption from multilinear maps. In: ISC, vol 9290 of LNCS. Springer, pp 336–354
30.
Zurück zum Zitat Datta P, Dutta R, Mukhopadhyay S (2016) Adaptively secure unrestricted attribute-based encryption with subset difference revocation in bilinear groups of prime order. In: Pointcheval D, Nitaj A, Rachidi T (eds) Progress in Cryptology—AFRICACRYPT, Lecture Notes in Computer Science. Springer, vol 9646, pp 325–345 Datta P, Dutta R, Mukhopadhyay S (2016) Adaptively secure unrestricted attribute-based encryption with subset difference revocation in bilinear groups of prime order. In: Pointcheval D, Nitaj A, Rachidi T (eds) Progress in Cryptology—AFRICACRYPT, Lecture Notes in Computer Science. Springer, vol 9646, pp 325–345
32.
Zurück zum Zitat Nieto JMG, Manulis M, Sun D (2012) Fully private revocable predicate encryption. In: Susilo W, Mu Y, Seberry J (eds) Information Security and Privacy, ACISP. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 7372, pp 350–363 Nieto JMG, Manulis M, Sun D (2012) Fully private revocable predicate encryption. In: Susilo W, Mu Y, Seberry J (eds) Information Security and Privacy, ACISP. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 7372, pp 350–363
33.
Zurück zum Zitat Wang P, Feng D, Zhang L (2011) Towards attribute revocation in key-policy attribute-based encryption. In: Lin D, Tsudik G, Wang X (eds) Cryptology and Network Security, CANS, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 7092, pp 272–291 Wang P, Feng D, Zhang L (2011) Towards attribute revocation in key-policy attribute-based encryption. In: Lin D, Tsudik G, Wang X (eds) Cryptology and Network Security, CANS, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 7092, pp 272–291
34.
Zurück zum Zitat Jia X, He D, Zeadally S, Li L (2017) Efficient revocable ID-based signature with cloud revocation server. IEEE Access 99:1–9CrossRef Jia X, He D, Zeadally S, Li L (2017) Efficient revocable ID-based signature with cloud revocation server. IEEE Access 99:1–9CrossRef
35.
Zurück zum Zitat Namasudra S (2021) Data access control in the cloud computing environment for bioinformatics. Int J Appl Res Bioinform 11(1):40–50CrossRef Namasudra S (2021) Data access control in the cloud computing environment for bioinformatics. Int J Appl Res Bioinform 11(1):40–50CrossRef
36.
Zurück zum Zitat Namasudra S (2019) An improved attribute-based encryption technique toward the data security in cloud computing. Concurr Comput Pract Exp 31(3):e4364 Namasudra S (2019) An improved attribute-based encryption technique toward the data security in cloud computing. Concurr Comput Pract Exp 31(3):e4364
38.
Zurück zum Zitat Ma W, Ma J, Zhang Q, Xue H, Li Y, Dang X, Zhao M, Zhang J, Han C, Wu J (2020) Attribute revocable data sharing scheme based on blockchain and CP-ABE. In: Proceedings of the 4th International Conference on Computer Science and Application Engineering (CSAE 2020), Association for Computing Machinery, New York, NY, USA, pp 1–7 Ma W, Ma J, Zhang Q, Xue H, Li Y, Dang X, Zhao M, Zhang J, Han C, Wu J (2020) Attribute revocable data sharing scheme based on blockchain and CP-ABE. In: Proceedings of the 4th International Conference on Computer Science and Application Engineering (CSAE 2020), Association for Computing Machinery, New York, NY, USA, pp 1–7
40.
Zurück zum Zitat Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Netw Appl 13:1643–1655CrossRef Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Netw Appl 13:1643–1655CrossRef
46.
Zurück zum Zitat Fan K, Wang J, Wang X, Yang Y (2017) Proxy-assisted access control scheme of cloud data for smart cities. Pers Ubiquit Comput 21(5):937–947CrossRef Fan K, Wang J, Wang X, Yang Y (2017) Proxy-assisted access control scheme of cloud data for smart cities. Pers Ubiquit Comput 21(5):937–947CrossRef
50.
Zurück zum Zitat Liebenau J, Elaluf-Calderwood SM (2008) Blockchain innovation beyond bitcoin and banking. In: Legally-Enforceable Fairness in Secure Two-Party Computation Topics in Cryptology—CT-RSA. Springer, pp 121–137 Liebenau J, Elaluf-Calderwood SM (2008) Blockchain innovation beyond bitcoin and banking. In: Legally-Enforceable Fairness in Secure Two-Party Computation Topics in Cryptology—CT-RSA. Springer, pp 121–137
51.
Zurück zum Zitat Crosby M, Pattanayak P, Verma S, Kalyanaraman V (2016) Blockchain technology: beyond bitcoin. Appl Innov 2:6–10 Crosby M, Pattanayak P, Verma S, Kalyanaraman V (2016) Blockchain technology: beyond bitcoin. Appl Innov 2:6–10
52.
Zurück zum Zitat Sankar LS, Sindhu M, Sethumadhavan M (2017) Survey of consensus protocols on blockchain applications. In: Proceeding of the 4th International Conference on Advanced Computing and Communication Systems (ICACCS), pp 1–5 Sankar LS, Sindhu M, Sethumadhavan M (2017) Survey of consensus protocols on blockchain applications. In: Proceeding of the 4th International Conference on Advanced Computing and Communication Systems (ICACCS), pp 1–5
54.
Zurück zum Zitat Buyya R, Ranjan R, Calheiros RN (2009) Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities. In: Proceedings of the International Conference on High Performance Computing and Simulation, pp 1–11. https://doi.org/10.1109/HPCSIM.2009.5192685 Buyya R, Ranjan R, Calheiros RN (2009) Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities. In: Proceedings of the International Conference on High Performance Computing and Simulation, pp 1–11. https://​doi.​org/​10.​1109/​HPCSIM.​2009.​5192685
Metadaten
Titel
Blockchain-based cloud storage system with CP-ABE-based access control and revocation process
verfasst von
Pratima Sharma
Rajni Jindal
Malaya Dutta Borah
Publikationsdatum
03.01.2022
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 6/2022
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-021-04179-4

Weitere Artikel der Ausgabe 6/2022

The Journal of Supercomputing 6/2022 Zur Ausgabe

Premium Partner