2016 International Conference on Microelectronics, Computing and Communications (MicroCom) 2016
DOI: 10.1109/microcom.2016.7522518
|View full text |Cite
|
Sign up to set email alerts
|

Multi-authority scheme based CP-ABE with attribute revocation for cloud data storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…In particular, a masquerade attack may occur when a user has left in the Sekhar scheme [4], and in the Zhu scheme [5] attackers can access data using other users' attributes. The Xu scheme [6], Yang scheme [7], and Ramesh scheme [8] apply attribute retraction upon user withdrawal. However, the Xu scheme and Yang scheme are inefficient because when users withdraw, they update both the key of other users participating in the cloud and the ciphertext stored in the cloud.…”
Section: Previously Proposed Cp-abe Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, a masquerade attack may occur when a user has left in the Sekhar scheme [4], and in the Zhu scheme [5] attackers can access data using other users' attributes. The Xu scheme [6], Yang scheme [7], and Ramesh scheme [8] apply attribute retraction upon user withdrawal. However, the Xu scheme and Yang scheme are inefficient because when users withdraw, they update both the key of other users participating in the cloud and the ciphertext stored in the cloud.…”
Section: Previously Proposed Cp-abe Schemesmentioning
confidence: 99%
“…but some schemes are vulnerable to a variety of security threats or are inefficient. Especially from a security point of view, the CP-ABE scheme should not be accessible after unsubscribing because the user's attributes are completely removed when the user leaves the existing cloud environment [4][5][6][7][8][9][10][11][12]. A user who has left creates a problem if he / she can access the cloud environment with their existing attributes and the secret key they had.…”
Section: Introductionmentioning
confidence: 99%
“…Chase [13] proposes a multiauthority ABE scheme, which transfers the generation of private keys to multiple authorities to complete together. Ramesh and Priya [14], Fan et al [15] propose a multiauthority CP-ABE scheme, in which every attribute authority should register itself to the KA, the KA then assigns a unique global authority identity AID to each legitimate attribute authority. After that, the attribute authority uses its AID to generate the attribute key for users.…”
Section: A Key Authoritymentioning
confidence: 99%
“…The outsourcing of authorization services to the cloud has been traditionally considered as a successful workaround to alleviate the computational burden incurred by standalone systems. For instance, [13] proposes a distributed architecture where IoT data are outsourced to cloud components and attribute-based authorization functionalities are handled by the cloud as well. However, authentication and authorization functionalities are handled at the same time, and the access is granted only if the entity is online.…”
Section: Security Issues and Literature Reviewmentioning
confidence: 99%