MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "2f1c9fe9-c17f-4ac2-9848-733f0f145cf2"}, "_deposit": {"created_by": 45, "id": "6293", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "recid", "value": "6293"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/6293", "sets": ["user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "There are a lot of data exchanges among the parties by\nusing cloud computing. So data protection is very\nimportant in cloud security environment. Especially, data\nprotection is needed for all organization by security\nservices against unauthorized accesses. There are many\nsecurity mechanisms for data protection. Attributes-based\nEncryption (ABE) is a one-to-many encryption to encrypt\nand decrypt data based on user attributes in which the\nsecret key of a user and the ciphertext are dependent\nupon attributes. Ciphertext policy attributes-based\nencryption (CP-ABE), an improvement of ABE schemes\nperforms an access control of security mechanisms for\ncloud storage. In this paper, sensitive parts of personal\nhealth records (PHRs) are encrypted by ABE with the\nhelp of CP-ABE. Moreover, an attributes-based policy\nrevocation case is considered as well as user revocation\nand it needs to generate a new secret key. In proposed\npolicy revocation case, PHRs owner changes attributes\npolicy to update available user lists. A trusted authority\n(TA) is used to issue secret keys as a third party. This\npaper emphasizes on key management and it also\nimproves attributes policy management and user\nrevocation. Proposed scheme provides a full control on\ndata owner as much as he changes policy. It supports a\nflexible policy revocation in CP-ABE and it saves time\nconsuming by comparing with traditional CP-ABE."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Attributes-based encryption (ABE)"}, {"interim": "Ciphertext policy attributes-based encryption (CP-ABE)"}, {"interim": "Personal Health Records (PHRs)"}, {"interim": "Trusted Authority (TA)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-11-19"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation.pdf", "filesize": [{"value": "1.5 Mb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensefree": "© 2018 ICAIT", "licensetype": "license_free", "mimetype": "application/pdf", "size": 1500000.0, "url": {"url": "https://meral.edu.mm/record/6293/files/A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation.pdf"}, "version_id": "dda3786e-a866-409d-816b-634e5dc74a5e"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "ICAIT-2018", "subitem_c_date": "1-2 November, 2018", "subitem_conference_title": "2nd International Conference on Advanced Information Technologies", "subitem_place": "Yangon, Myanmar", "subitem_session": "Cloud and Distributed Computing", "subitem_website": "https://www.uit.edu.mm/icait-2018/"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Phyo Wah Wah Myint"}, {"subitem_authors_fullname": "Swe Zin Hlaing"}, {"subitem_authors_fullname": "Ei Chaw Htoon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2018-11-02"}, "item_title": "A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation", "item_type_id": "21", "owner": "45", "path": ["1605779935331"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000006293", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-11-19"}, "publish_date": "2020-11-19", "publish_status": "0", "recid": "6293", "relation": {}, "relation_version_is_last": true, "title": ["A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation"], "weko_shared_id": -1}
A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation
http://hdl.handle.net/20.500.12678/0000006293
http://hdl.handle.net/20.500.12678/00000062930470d393-284a-4177-a48a-d579a7bead9f
2f1c9fe9-c17f-4ac2-9848-733f0f145cf2
| Name / File | License | Actions |
|---|---|---|
|
|
© 2018 ICAIT
|
| Publication type | ||||||
|---|---|---|---|---|---|---|
| Conference paper | ||||||
| Upload type | ||||||
| Publication | ||||||
| Title | ||||||
| Title | A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation | |||||
| Language | en | |||||
| Publication date | 2018-11-02 | |||||
| Authors | ||||||
| Phyo Wah Wah Myint | ||||||
| Swe Zin Hlaing | ||||||
| Ei Chaw Htoon | ||||||
| Description | ||||||
| There are a lot of data exchanges among the parties by using cloud computing. So data protection is very important in cloud security environment. Especially, data protection is needed for all organization by security services against unauthorized accesses. There are many security mechanisms for data protection. Attributes-based Encryption (ABE) is a one-to-many encryption to encrypt and decrypt data based on user attributes in which the secret key of a user and the ciphertext are dependent upon attributes. Ciphertext policy attributes-based encryption (CP-ABE), an improvement of ABE schemes performs an access control of security mechanisms for cloud storage. In this paper, sensitive parts of personal health records (PHRs) are encrypted by ABE with the help of CP-ABE. Moreover, an attributes-based policy revocation case is considered as well as user revocation and it needs to generate a new secret key. In proposed policy revocation case, PHRs owner changes attributes policy to update available user lists. A trusted authority (TA) is used to issue secret keys as a third party. This paper emphasizes on key management and it also improves attributes policy management and user revocation. Proposed scheme provides a full control on data owner as much as he changes policy. It supports a flexible policy revocation in CP-ABE and it saves time consuming by comparing with traditional CP-ABE. |
||||||
| Keywords | ||||||
| Attributes-based encryption (ABE), Ciphertext policy attributes-based encryption (CP-ABE), Personal Health Records (PHRs), Trusted Authority (TA) | ||||||
| Conference papers | ||||||
| ICAIT-2018 | ||||||
| 1-2 November, 2018 | ||||||
| 2nd International Conference on Advanced Information Technologies | ||||||
| Yangon, Myanmar | ||||||
| Cloud and Distributed Computing | ||||||
| https://www.uit.edu.mm/icait-2018/ | ||||||