Skip to main content
Top

2018 | OriginalPaper | Chapter

Secure and Efficient Data Sharing with User Revocation in Cloud

Authors : Nalini Sri Mallela, Nagaraju Devarakonda

Published in: Advanced Computational and Communication Paradigms

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the recent trends, secure and efficient plan is required to get the access control of shared data in distributed systems. Different ABE schemes are provided for secure data sharing but, in CP-ABE scheme, a set of attributes are associated with each user the data on to user was encrypted based on access structure formed from the set of attributes. Any user who satisfies the access structure of the encrypted text they can only the decrypt the encrypted text. In data outsourcing environment, if you use this attribute-based encryption (ABE) results some challenges in case of attribute and user revocation. In smart grid provides sensitive data sharing policies and schemes because it has to deal with sensitive information and maintains flexibility for giving information about the policies used for the data protection or authentication details of data owner and receiver. A movement toward secure and efficient data sharing with fine grain access control. We propose a scheme that enables the “secure data sharing and key distribution” with communication channels, and the users can obtain their secret keys from the “key generation center (KGC)” and our scheme can accomplish “fine grain access control” and the user in the users’ list can use the data available in the cloud and restricted access is only allowed for the revoked users. Our proposed scheme enables the secure user revocation, key distribution, data confidentiality, and fine grain access control in cloud.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems member. IEEE Trans. Parallel Distrib. Syst. 22(7) (2011) Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems member. IEEE Trans. Parallel Distrib. Syst. 22(7) (2011)
2.
go back to reference Hur, J.: Attribute-based secure data sharing with hidden policies in smart grid. IEEE Trans. Parallel Distrib. Syst. 24(11) (2013) Hur, J.: Attribute-based secure data sharing with hidden policies in smart grid. IEEE Trans. Parallel Distrib. Syst. 24(11) (2013)
3.
go back to reference Attribute-based data sharing to provide priority based security to improve the performance efficiency. Int. J. Comput. Trends Technol. (IJCTT) 14(3) (2014) Attribute-based data sharing to provide priority based security to improve the performance efficiency. Int. J. Comput. Trends Technol. (IJCTT) 14(3) (2014)
4.
go back to reference Qinlong, H., Zhaofeng, M.A., Yixian, Y., Xinxin, N., Jingyi, F.: Improving Security and Efficiency for Encrypted Data Sharing in Online Social Networks Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China Qinlong, H., Zhaofeng, M.A., Yixian, Y., Xinxin, N., Jingyi, F.: Improving Security and Efficiency for Encrypted Data Sharing in Online Social Networks Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
5.
go back to reference Huang, X., Liu, J.K., Tang, S., Xiang, Y., Liang, K., Xu, L., Zhou, J.: Cost-effective authentic and anonymous data sharing with forward security. IEEE Trans. Comput. 64(4) (2015) Huang, X., Liu, J.K., Tang, S., Xiang, Y., Liang, K., Xu, L., Zhou, J.: Cost-effective authentic and anonymous data sharing with forward security. IEEE Trans. Comput. 64(4) (2015)
6.
go back to reference Samanthula, B.K., Elmehdwi, Y., Jiang, W.: K-nearest neighbor classification over semantically secure encrypted relational. IEEE Trans. Knowl. Data Eng. 27(5) (2015) Samanthula, B.K., Elmehdwi, Y., Jiang, W.: K-nearest neighbor classification over semantically secure encrypted relational. IEEE Trans. Knowl. Data Eng. 27(5) (2015)
7.
go back to reference Hur, J.: Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25(10) (2013) Hur, J.: Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25(10) (2013)
8.
go back to reference Yu, S., Wang, C., Ren, K.: Attribute based data sharing with attribute revocation In: ASIACCS’10, Beijing, China, 13–16 Apr 2010. Copyright 2010. ACM. ISBN 978-1-60558-936-7 Yu, S., Wang, C., Ren, K.: Attribute based data sharing with attribute revocation In: ASIACCS’10, Beijing, China, 13–16 Apr 2010. Copyright 2010. ACM. ISBN 978-1-60558-936-7
9.
go back to reference Qinlong, H., Zhaofeng, M.A., Yixian Y., Jingyi, F., Xinxin, N.: EABDS: Attribute-based secure data sharing with efficient revocation in cloud computing (1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China) (2. National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China) Chin. J. Electron. 24(4) (2015) Qinlong, H., Zhaofeng, M.A., Yixian Y., Jingyi, F., Xinxin, N.: EABDS: Attribute-based secure data sharing with efficient revocation in cloud computing (1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China) (2. National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China) Chin. J. Electron. 24(4) (2015)
10.
go back to reference Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of International Conference Practice Theory Public Key Cryptography Conf. Public Key Cryptography, pp. 53–70. 2008 Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of International Conference Practice Theory Public Key Cryptography Conf. Public Key Cryptography, pp. 53–70. 2008
11.
go back to reference Boneh, D., Boyen, X., Goh, E.: Hierarchical identity based encryption with constant size ciphertext. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 440–456. 2005 Boneh, D., Boyen, X., Goh, E.: Hierarchical identity based encryption with constant size ciphertext. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 440–456. 2005
12.
go back to reference Delerablee, C., Paillier, P., Pointcheval, D.: Fully collusion secure dynamic broadcast encryption with constant-size Ci-pher-texts or decryption keys. In: Proceedings of the International Conference on Pairing-Based Cryptography, pp. 39–59. 2007 Delerablee, C., Paillier, P., Pointcheval, D.: Fully collusion secure dynamic broadcast encryption with constant-size Ci-pher-texts or decryption keys. In: Proceedings of the International Conference on Pairing-Based Cryptography, pp. 39–59. 2007
13.
go back to reference Zhu, Z., Jiang, Z., Jiang, R.: The attack on mona: secure multi-owner data sharing for dynamic groups in the cloud. In Proceedings of the International Conference on Information Science and Cloud Computing, 7 Dec 2013, pp. 185–189 Zhu, Z., Jiang, Z., Jiang, R.: The attack on mona: secure multi-owner data sharing for dynamic groups in the cloud. In Proceedings of the International Conference on Information Science and Cloud Computing, 7 Dec 2013, pp. 185–189
14.
go back to reference Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inf. Forensics Secur. 8(12), 1947–1960 (2013)CrossRef Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inf. Forensics Secur. 8(12), 1947–1960 (2013)CrossRef
15.
go back to reference Zou, X., Dai, Y.-S., Bertino, E.: A practical and flexible key management mechanism for trusted collaborative computing. In: Proceedings of the IEEE Conference on Computer Communications, pp. 1211–1219. 2008 Zou, X., Dai, Y.-S., Bertino, E.: A practical and flexible key management mechanism for trusted collaborative computing. In: Proceedings of the IEEE Conference on Computer Communications, pp. 1211–1219. 2008
16.
go back to reference Zhu, Z., Jiang, R.: A secure anti-collusion data sharing scheme for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(1) (2016) Zhu, Z., Jiang, R.: A secure anti-collusion data sharing scheme for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(1) (2016)
Metadata
Title
Secure and Efficient Data Sharing with User Revocation in Cloud
Authors
Nalini Sri Mallela
Nagaraju Devarakonda
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8237-5_55