Skip to main content
Top
Published in: The Journal of Supercomputing 6/2022

03-01-2022

Blockchain-based cloud storage system with CP-ABE-based access control and revocation process

Authors: Pratima Sharma, Rajni Jindal, Malaya Dutta Borah

Published in: The Journal of Supercomputing | Issue 6/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud system provides an on-demand and low-cost computing and storing model. Many organizations and individual end-users are using cloud storage services to back up their crucial data. However, this storage utility suffers from various threats and security issues. Before outsourcing the data to the cloud server, some data security measures should be imposed to ensure security. The blockchain is an advanced technology that stores data in a distributed manner and provides a more secure environment. Therefore, we propose a blockchain-based framework with the Ciphertext Policy Attribute-based Encryption algorithm to provide access control and user revocation methods in the cloud storage system to resolve the above issues. Our scheme offers three main features to provide a secure environment. First, a java-based blockchain network is designed to register data owners and attribute authority using a key generation algorithm. Second, the data owners and attribute authorities store the public information in the blockchain structure, set access policies, and generate the user’s secret key to resolve key escrow problems. Third, the immediate attribute modification is deployed to attain fine-grained access control with the user revocation process. The experimental results, analysis, and performance evaluation show that our scheme provides a feasible and reliable environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Azhir E, Navimipour NJ, Hosseinzadeh M, Sharifi A, Darwesh A (2019) Query optimization mechanisms in the cloud environments: a systematic study. Int J Commun Syst 32(8):e3940CrossRef Azhir E, Navimipour NJ, Hosseinzadeh M, Sharifi A, Darwesh A (2019) Query optimization mechanisms in the cloud environments: a systematic study. Int J Commun Syst 32(8):e3940CrossRef
2.
go back to reference Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115CrossRef Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115CrossRef
3.
go back to reference Shin Y, Koo D, Hur J (2017) A survey of secure data deduplication schemes for cloud storage systems. ACM Comput Surv 49(4):1–38CrossRef Shin Y, Koo D, Hur J (2017) A survey of secure data deduplication schemes for cloud storage systems. ACM Comput Surv 49(4):1–38CrossRef
4.
go back to reference Du M, Wang Q, He M, Weng J (2018) Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans Inf Forensics Secur 13(9):2320–2332CrossRef Du M, Wang Q, He M, Weng J (2018) Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans Inf Forensics Secur 13(9):2320–2332CrossRef
5.
go back to reference Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61CrossRef Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61CrossRef
7.
go back to reference Kaaniche N, Laurent M (2017) Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput Commun 111:120–141CrossRef Kaaniche N, Laurent M (2017) Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput Commun 111:120–141CrossRef
8.
go back to reference Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115CrossRef Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115CrossRef
9.
go back to reference Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Yi (2018) Cloud aided lightweight certificate less authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123CrossRef Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Yi (2018) Cloud aided lightweight certificate less authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123CrossRef
12.
go back to reference Kofahi NA, Al-Rabadi AR (2018) Identifying the top threats in cloud computing and its suggested solutions: a survey. Networks 6(1):1–13MathSciNet Kofahi NA, Al-Rabadi AR (2018) Identifying the top threats in cloud computing and its suggested solutions: a survey. Networks 6(1):1–13MathSciNet
13.
go back to reference Zyskind G, Nathan O, et al (2015) Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops (SPW). IEEE, pp 180–184 Zyskind G, Nathan O, et al (2015) Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops (SPW). IEEE, pp 180–184
14.
go back to reference Bethencourt J, Sahai A, Waters B (2008) Ciphertext-policy attribute-based encryption. In: Proceeding of the IEEE Symposium on Security and Privacy (SP), pp 321–334 Bethencourt J, Sahai A, Waters B (2008) Ciphertext-policy attribute-based encryption. In: Proceeding of the IEEE Symposium on Security and Privacy (SP), pp 321–334
15.
go back to reference Namasudra S, Deka GC, Johri P, Hosseinpour M, Gandomi AH (2021) The revolution of blockchain: state-of-the-art and research challenges. Arch Comput Methods Eng 28(3):1497–1515CrossRef Namasudra S, Deka GC, Johri P, Hosseinpour M, Gandomi AH (2021) The revolution of blockchain: state-of-the-art and research challenges. Arch Comput Methods Eng 28(3):1497–1515CrossRef
16.
go back to reference Sharma P, Jindal R, Borah MD (2020) Blockchain technology for cloud storage: a systematic literature review. ACM Comput Surv 53(4):1–32CrossRef Sharma P, Jindal R, Borah MD (2020) Blockchain technology for cloud storage: a systematic literature review. ACM Comput Surv 53(4):1–32CrossRef
17.
go back to reference Meng W, Tischhauser E, Wang Q, Wang Y, Han J (2018) When intrusion detection meets blockchain technology: a review. IEEE Access 6:10179–10188CrossRef Meng W, Tischhauser E, Wang Q, Wang Y, Han J (2018) When intrusion detection meets blockchain technology: a review. IEEE Access 6:10179–10188CrossRef
18.
go back to reference Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Yi (2018) An id-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640CrossRef Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Yi (2018) An id-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640CrossRef
19.
go back to reference Sharma P, Jindal R, Borah MD (2021) Blockchain-based decentralized architecture for cloud storage system. J Inf Secur Appl 62:1–15 Sharma P, Jindal R, Borah MD (2021) Blockchain-based decentralized architecture for cloud storage system. J Inf Secur Appl 62:1–15
20.
go back to reference Mohajer A, Barari M, Zarrabi H (2018) Big data-based self-optimization networking: a novel approach beyond cognition. Intell Autom Soft Comput 24(2):413–420CrossRef Mohajer A, Barari M, Zarrabi H (2018) Big data-based self-optimization networking: a novel approach beyond cognition. Intell Autom Soft Comput 24(2):413–420CrossRef
21.
go back to reference Masdari M, Ahmadzadeh S, Bidaki M (2017) Key management in wireless body area network: challenges and issues. J Netw Comput Appl 91:36–51CrossRef Masdari M, Ahmadzadeh S, Bidaki M (2017) Key management in wireless body area network: challenges and issues. J Netw Comput Appl 91:36–51CrossRef
22.
go back to reference Mohajer A, Bavaghar M, Farrokhi H (2020) Mobility-aware load balancing for reliable self-organization networks: multi-agent deep reinforcement learning. Reliab Eng Syst Saf 202:107056CrossRef Mohajer A, Bavaghar M, Farrokhi H (2020) Mobility-aware load balancing for reliable self-organization networks: multi-agent deep reinforcement learning. Reliab Eng Syst Saf 202:107056CrossRef
23.
go back to reference Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (eds) Advances in cryptology—EUROCRYPT. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 3494, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (eds) Advances in cryptology—EUROCRYPT. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 3494, pp 457–473
24.
go back to reference Attrapadung N, Imai H (2009) Attribute-based encryption supporting direct/indirect revocation modes. In: Parker MG (eds) Cryptography and Coding, IMACC, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 5921, pp 278–300 Attrapadung N, Imai H (2009) Attribute-based encryption supporting direct/indirect revocation modes. In: Parker MG (eds) Cryptography and Coding, IMACC, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 5921, pp 278–300
25.
go back to reference Attrapadung N, Libert B, de Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) Public Key Cryptography—PKC 2011, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 6571, pp 90–108 Attrapadung N, Libert B, de Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) Public Key Cryptography—PKC 2011, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 6571, pp 90–108
26.
go back to reference Masdari M, Jabbehdari S, Ahmadi MR, Hashemi SM, Bagherzadeh J, Khadem-Zadeh A (2011) A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks. EURASIP J Wirel Commun Netw 112:1–12 Masdari M, Jabbehdari S, Ahmadi MR, Hashemi SM, Bagherzadeh J, Khadem-Zadeh A (2011) A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks. EURASIP J Wirel Commun Netw 112:1–12
27.
go back to reference Masdari M, Bidaki M, Naghiloo F (2017) Comprehensive evaluation of the localized certificate revocation in mobile ad hoc network. Wireless Pers Commun 94:977–1001CrossRef Masdari M, Bidaki M, Naghiloo F (2017) Comprehensive evaluation of the localized certificate revocation in mobile ad hoc network. Wireless Pers Commun 94:977–1001CrossRef
29.
go back to reference Datta P, Dutta R, Mukhopadhyay S (2015) General circuit realizing compact revocable attribute-based encryption from multilinear maps. In: ISC, vol 9290 of LNCS. Springer, pp 336–354 Datta P, Dutta R, Mukhopadhyay S (2015) General circuit realizing compact revocable attribute-based encryption from multilinear maps. In: ISC, vol 9290 of LNCS. Springer, pp 336–354
30.
go back to reference Datta P, Dutta R, Mukhopadhyay S (2016) Adaptively secure unrestricted attribute-based encryption with subset difference revocation in bilinear groups of prime order. In: Pointcheval D, Nitaj A, Rachidi T (eds) Progress in Cryptology—AFRICACRYPT, Lecture Notes in Computer Science. Springer, vol 9646, pp 325–345 Datta P, Dutta R, Mukhopadhyay S (2016) Adaptively secure unrestricted attribute-based encryption with subset difference revocation in bilinear groups of prime order. In: Pointcheval D, Nitaj A, Rachidi T (eds) Progress in Cryptology—AFRICACRYPT, Lecture Notes in Computer Science. Springer, vol 9646, pp 325–345
32.
go back to reference Nieto JMG, Manulis M, Sun D (2012) Fully private revocable predicate encryption. In: Susilo W, Mu Y, Seberry J (eds) Information Security and Privacy, ACISP. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 7372, pp 350–363 Nieto JMG, Manulis M, Sun D (2012) Fully private revocable predicate encryption. In: Susilo W, Mu Y, Seberry J (eds) Information Security and Privacy, ACISP. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 7372, pp 350–363
33.
go back to reference Wang P, Feng D, Zhang L (2011) Towards attribute revocation in key-policy attribute-based encryption. In: Lin D, Tsudik G, Wang X (eds) Cryptology and Network Security, CANS, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 7092, pp 272–291 Wang P, Feng D, Zhang L (2011) Towards attribute revocation in key-policy attribute-based encryption. In: Lin D, Tsudik G, Wang X (eds) Cryptology and Network Security, CANS, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, vol 7092, pp 272–291
34.
go back to reference Jia X, He D, Zeadally S, Li L (2017) Efficient revocable ID-based signature with cloud revocation server. IEEE Access 99:1–9CrossRef Jia X, He D, Zeadally S, Li L (2017) Efficient revocable ID-based signature with cloud revocation server. IEEE Access 99:1–9CrossRef
35.
go back to reference Namasudra S (2021) Data access control in the cloud computing environment for bioinformatics. Int J Appl Res Bioinform 11(1):40–50CrossRef Namasudra S (2021) Data access control in the cloud computing environment for bioinformatics. Int J Appl Res Bioinform 11(1):40–50CrossRef
36.
go back to reference Namasudra S (2019) An improved attribute-based encryption technique toward the data security in cloud computing. Concurr Comput Pract Exp 31(3):e4364 Namasudra S (2019) An improved attribute-based encryption technique toward the data security in cloud computing. Concurr Comput Pract Exp 31(3):e4364
38.
go back to reference Ma W, Ma J, Zhang Q, Xue H, Li Y, Dang X, Zhao M, Zhang J, Han C, Wu J (2020) Attribute revocable data sharing scheme based on blockchain and CP-ABE. In: Proceedings of the 4th International Conference on Computer Science and Application Engineering (CSAE 2020), Association for Computing Machinery, New York, NY, USA, pp 1–7 Ma W, Ma J, Zhang Q, Xue H, Li Y, Dang X, Zhao M, Zhang J, Han C, Wu J (2020) Attribute revocable data sharing scheme based on blockchain and CP-ABE. In: Proceedings of the 4th International Conference on Computer Science and Application Engineering (CSAE 2020), Association for Computing Machinery, New York, NY, USA, pp 1–7
40.
go back to reference Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Netw Appl 13:1643–1655CrossRef Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Netw Appl 13:1643–1655CrossRef
46.
go back to reference Fan K, Wang J, Wang X, Yang Y (2017) Proxy-assisted access control scheme of cloud data for smart cities. Pers Ubiquit Comput 21(5):937–947CrossRef Fan K, Wang J, Wang X, Yang Y (2017) Proxy-assisted access control scheme of cloud data for smart cities. Pers Ubiquit Comput 21(5):937–947CrossRef
50.
go back to reference Liebenau J, Elaluf-Calderwood SM (2008) Blockchain innovation beyond bitcoin and banking. In: Legally-Enforceable Fairness in Secure Two-Party Computation Topics in Cryptology—CT-RSA. Springer, pp 121–137 Liebenau J, Elaluf-Calderwood SM (2008) Blockchain innovation beyond bitcoin and banking. In: Legally-Enforceable Fairness in Secure Two-Party Computation Topics in Cryptology—CT-RSA. Springer, pp 121–137
51.
go back to reference Crosby M, Pattanayak P, Verma S, Kalyanaraman V (2016) Blockchain technology: beyond bitcoin. Appl Innov 2:6–10 Crosby M, Pattanayak P, Verma S, Kalyanaraman V (2016) Blockchain technology: beyond bitcoin. Appl Innov 2:6–10
52.
go back to reference Sankar LS, Sindhu M, Sethumadhavan M (2017) Survey of consensus protocols on blockchain applications. In: Proceeding of the 4th International Conference on Advanced Computing and Communication Systems (ICACCS), pp 1–5 Sankar LS, Sindhu M, Sethumadhavan M (2017) Survey of consensus protocols on blockchain applications. In: Proceeding of the 4th International Conference on Advanced Computing and Communication Systems (ICACCS), pp 1–5
54.
go back to reference Buyya R, Ranjan R, Calheiros RN (2009) Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities. In: Proceedings of the International Conference on High Performance Computing and Simulation, pp 1–11. https://doi.org/10.1109/HPCSIM.2009.5192685 Buyya R, Ranjan R, Calheiros RN (2009) Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities. In: Proceedings of the International Conference on High Performance Computing and Simulation, pp 1–11. https://​doi.​org/​10.​1109/​HPCSIM.​2009.​5192685
Metadata
Title
Blockchain-based cloud storage system with CP-ABE-based access control and revocation process
Authors
Pratima Sharma
Rajni Jindal
Malaya Dutta Borah
Publication date
03-01-2022
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 6/2022
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-021-04179-4

Other articles of this Issue 6/2022

The Journal of Supercomputing 6/2022 Go to the issue

Premium Partner