2021
DOI: 10.1109/access.2021.3110824
|View full text |Cite
|
Sign up to set email alerts
|

Accountable and Revocable Large Universe Decentralized Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT

Abstract: The data collected, stored, shared, and accessed across different platforms in the dynamic IoT is mostly confidential and privacy-sensitive. Data security and access control issues urgently need to be addressed. Multi-authority attribute-based encryption (MA-ABE) is seen as a potential solution for addressing data access control security concerns in the dynamic IoT since it allows for dynamic access control over encrypted data. However, the existing key abuse problem is severely destroying the security access … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 51 publications
0
5
0
Order By: Relevance
“…The study of existing multi-authority CPABE schemes based on bilinear pairing cryptography exhibits that very few schemes have addressed both levels of revocation however, the approaches implemented to restrict the access privileges of the revoked users have not considered the potentiality of the cloud service provider to collude with the revoked users [21][22][23]. Huang [23] too updated users' key and re-encrypted ciphertext to enforce user and attribute-level revocation. All attributes held by the user have been revoked by the involved attribute authorities in the proposed approach to address user revocation.…”
Section: Attribute-level Revocationmentioning
confidence: 99%
“…The study of existing multi-authority CPABE schemes based on bilinear pairing cryptography exhibits that very few schemes have addressed both levels of revocation however, the approaches implemented to restrict the access privileges of the revoked users have not considered the potentiality of the cloud service provider to collude with the revoked users [21][22][23]. Huang [23] too updated users' key and re-encrypted ciphertext to enforce user and attribute-level revocation. All attributes held by the user have been revoked by the involved attribute authorities in the proposed approach to address user revocation.…”
Section: Attribute-level Revocationmentioning
confidence: 99%
“…Estimate A ij by using equation (11); End if End for S j End for S i End for X k Step 3: Compute exponential matrix Expm ij and the average A ij of relevant vector R ij based on the estimated list index avg idx and update avg list in the list by using equations ( 12) to (14); For y = 1 to S j Compute the related average of overall vector avg R by using equation (15); Compute the distance list dis ls between the average list avg 2 List and the related parameter avg R 2 by using equation ( 16); Update C id with the minimum of dis ls as shown in equation ( 17); End for y; Algorithm 2: Continued.…”
Section: Elsementioning
confidence: 99%
“…The conventional works developed different encryption and classification methodologies [13,14] to ensure secure data storage and retrieval in the IoT-cloud domain. Generally, the encryption techniques [15] like Advanced Encryption Standard (AES) [16], Rivest Shamir Adleman (RSA), SHA-512, and Elliptic Curve Cryptography (ECC) have been widely used in many data security systems [17]. Moreover, it helps decrypt the raw data before storage and retrieval processes with guaranteed security [18].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, the CTFilter algorithm in the partially hidden access structures (PHAS)-highly efficient key revocation (HEKR)-CPABE scheme increased the computational cost and made it vulnerable to collusion attacks. The approach proposed in [32] updated users' keys and re-encrypted ciphertext to enforce user and attribute-level revocation. All attributes held by the user have been revoked in the proposed approach by the involved attribute authorities to address user revocation.…”
Section: Introductionmentioning
confidence: 99%