Attribute-based access control with efficient revocation in data outsourcing systems

Junbeom Hur, Dong Kun Noh

Research output: Contribution to journalArticle

380 Citations (Scopus)

Abstract

Some of the most challenging issues in data outsourcing scenario are the enforcement of authorization policies and the support of policy updates. Ciphertext-policy attribute-based encryption is a promising cryptographic solution to these issues for enforcing access control policies defined by a data owner on outsourced data. However, the problem of applying the attribute-based encryption in an outsourced architecture introduces several challenges with regard to the attribute and user revocation. In this paper, we propose an access control mechanism using ciphertext-policy attribute-based encryption to enforce access control policies with efficient attribute and user revocation capability. The fine-grained access control can be achieved by dual encryption mechanism which takes advantage of the attribute-based encryption and selective group key distribution in each attribute group. We demonstrate how to apply the proposed mechanism to securely manage the outsourced data. The analysis results indicate that the proposed scheme is efficient and secure in the data outsourcing systems.

Original languageEnglish
Article number5629339
Pages (from-to)1214-1221
Number of pages8
JournalIEEE Transactions on Parallel and Distributed Systems
Volume22
Issue number7
DOIs
Publication statusPublished - 2011
Externally publishedYes

Keywords

  • Data outsourcing
  • access control.
  • attribute-based encryption
  • ciphertext policy
  • revocation

ASJC Scopus subject areas

  • Signal Processing
  • Hardware and Architecture
  • Computational Theory and Mathematics

Fingerprint Dive into the research topics of 'Attribute-based access control with efficient revocation in data outsourcing systems'. Together they form a unique fingerprint.

  • Cite this