JOURNAL ARTICLE

Ciphertext policy attribute based encryption with immediate attribute revocation for fine-grained access control in cloud storage

Abstract

With the advent of cloud computing, more and more organizations plan to adopt the cloud storage service allowing a data owner to outsource her data to the cloud service provider where the users are provided to access to the outsourced data. However, when the outsourced data are sensitive, the security and privacy of data have to be protected to eliminate the data owner's concerns. Since in cloud storage systems, the data owner and the cloud server are not with the same trust domain, the honest and curious cloud server cannot be relied on to define and enforce the access control policy. To tackle this open problem, existing methods use the cryptographic techniques such as symmetric encryption or traditional public encryption scheme requiring the data owner to encrypt the data and distribute decryption keys to the authorized users, which incur the complicated key distribution and management. In this work, ciphertext policy attribute based encryption scheme is presented to achieve fine-grained access control. Furthermore, in the presented scheme, an immediate attribute revocation method is presented to handle the dynamic updates of users' access privileges in cloud storage systems. Security analysis and performance evaluation show the proposed scheme is secure and efficient in cloud storage systems.

Keywords:
Computer science Cloud computing Attribute-based encryption Revocation Encryption Cloud storage Computer security Client-side encryption Ciphertext Access control Cloud computing security Outsourcing Cryptography Computer network Public-key cryptography On-the-fly encryption Operating system Business

Metrics

5
Cited By
0.94
FWCI (Field Weighted Citation Impact)
9
Refs
0.84
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.