DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Authors
Abstract:
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a novel authentication mechanism and a new revocation approach. To wide-spread adoptions of ABE for a resource-constrained device, a very light-weight authentication mechanism is required to authentication ciphertext before starting cost expensive ABE techniques to thwart Denial-of-Service (DoS) attacks which are used to power depletion and network downing purposes by attackers. We introduce and address the problem to more robustness of whole networks when DoS attacks are present. Moreover, we propose an efficient revocation mechanism which is a very important challenge in the context. Finally with a discussion on different aspects of the proposal and extensive experimental results we show its profitability.
similar resources
Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing
The existing digital rights management (DRM) schemes in cloud computing introduce a heavy computation overhead on the content provider for key distribution. In this paper, we propose an attribute-based DRM scheme in cloud computing by combining the techniques of ciphertextpolicy attribute-based encryption (CP-ABE) and proxy reencryption (PRE). We first divide the content encryption key into two...
full textAttribute-Based Encryption Optimized for Cloud Computing
In this work, we aim to make attribute-based encryption (ABE) more suitable for access control to data stored in the cloud. For this purpose, we concentrate on giving to the encryptor full control over the access rights, providing feasible key management even in case of multiple independent authorities, and enabling viable user revocation, which is essential in practice. Our main result is an e...
full textSearchable attribute-based encryption scheme with attribute revocation in cloud storage
Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute-based encryption scheme w...
full textAttribute-based Encryption with Decryption and Revocation Outsource in Cloud Environment
In order to improve the efficiency of attribute based encryption, according to the work of Li etal. [17] , a new technique is adopted to implement the revocation of attribute-based encryption. Based on the work of Green etal.[16], a ciphertext attribute based encryption (CP-ABE) scheme with outsourced revocation and decryption simultaneously is proposed. After outsourcing complex computation in...
full textA Survey on Attribute Based Encryption Scheme in Cloud Computing
Cloud computing, is an emerging computing paradigm, enabling users to remotely store their data in a server and provide services on-demand. In cloud computing cloud users and cloud service providers are almost certain to be from different trust domains. Data security and privacy are the critical issues for remote data storage. A secure user enforced data access control mechanism must be provide...
full textMulti-authority Attribute Based Encryption in Cloud Computing for Agriculture
Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the a...
full textMy Resources
Journal title
volume 32 issue 9
pages 1290- 1298
publication date 2019-09-01
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023