International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117 | Views: 188

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015


Decentralized Firewall for Attribute-Based Encryption with Verifiable and Revocable Cloud Access Control

Shintomon Mathew [2] | George T. Vadakkumcheril | T. Justin Jose


Abstract: The most difficult issues in data outsourcing are the requirement of authorization policies and the revocation of policy updates. In all current Ciphertext-Policy Attribute-Based Encryption (CP-ABE) schemes, it is expected that there is an Attribute Authority (AA) in the system to issuing attributes to the users. CP-ABE is a promising cryptographic answer for these issues for authorizing access control approaches characterized by a data owner on outsourced data. Be that as it may, it is hard to specifically apply existing CP-ABE plans to data access control for cloud storage frameworks on account of the attribute revocation issue. In numerous applications, there are various authorities exist together in a framework and every authority has the capacity to issue attributes independently. In this paper, we outline an access control structure for multi-authority frameworks and propose an efficient and secure multi-authority access control scheme for cloud storage. We first outline an efficient multi-authority CP-ABE scheme that does not oblige a global authority and can bolster any Linear Secret Sharing Scheme (LSSS) access structure. At that point, we demonstrate its security in the random oracle model. In particular, we propose a revocable multi-authority CP-ABE scheme, and apply it as the fundamental systems to outline the data access control scheme. The analysis results show that the proposed multi-authority access control scheme is scalable, efficient and secure in the data outsourcing systems.


Keywords: Access Control, Multi-Authority, CP-ABE, Attribute Revocation, Cloud Storage, Data Sharing, Decryption Outsourcing, Verifiability, Multi-receiver Identity-based Encryption


Edition: Volume 4 Issue 10, October 2015,


Pages: 165 - 173


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top