Title :
Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme
Author :
Changji Wang ; Haitao Lin ; Xilei Xu ; Kangjia Zheng ; Xiaonan Xia
Author_Institution :
Nat. Pilot Sch. of Software, Yunnan Univ., Kunming, China
Abstract :
Cloud computing has generated a major impact on the global IT ecosystem, which promises economic advantages, speed, agility, flexibility, virtually infinite elasticity and innovation. However, data security and privacy remain the biggest barriers to widespread adoption of cloud services. To address the problem of fine-grained access control over encrypted data that is faced by cloud services, ciphertext-policy attribute-based encryption (CP-ABE) technology was proposed in recent years and has aroused great concern of researchers. Although CP-ABE schemes provide the ability for data owner-centric protection in cloud services, they are not very practical with the respect to the efficiency and scalability of access right revocation and key refreshing. Recently Xu and Martin proposed a dynamic user revocation and key refreshing model for CP-ABE schemes, and presented a concrete construction based on Bethencourt et al.´s CP-ABE scheme. They claimed that their construction is efficient and provable secure. However, after revisiting the construction, we demonstrate that cloud service provider can not perform data retrieval task in their construction, and their construction cannot achieve one-to-many encryption.
Keywords :
cloud computing; cryptography; CP-ABE technology; attribute based encryption scheme; ciphertext policy attribute based encryption; cloud computing; cloud services; data encryption; data privacy; data retrieval; data security; dynamic user revocation; dynamic user revocation insecurity; fine grained access control; global IT ecosystem; key refreshing model; Access control; Cloud computing; Computational modeling; Encryption; Generators; Ciphertext-Policy Attribute-Based Encryption; Cloud Computing; Dynamic User Revocation; Key Refreshing;
Conference_Titel :
Computational Intelligence and Security (CIS), 2014 Tenth International Conference on
Conference_Location :
Kunming
Print_ISBN :
978-1-4799-7433-7
DOI :
10.1109/CIS.2014.100