Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "5bf0be05-6af2-47fc-ab83-8a5936ad4ae9"}, "_deposit": {"created_by": 107, "id": "7461", "owner": "107", "owners": [107], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "depid", "value": "7461"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/00007461", "sets": ["1608024197070", "user-ucstaungoo"]}, "communities": ["ucstaungoo"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "EAC: Encryption Access Control Scheme for Policy Revocation in Cloud Data", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Since a lot of information is outsourcing into cloud servers, data confidentiality becomes a higher risk to service providers. To assure data security, Ciphertext Policy Attributes-Based Encryption (CP-ABE) is observed for the cloud environment. Because ciphertexts and secret keys are relying on attributes, the revocation issue becomes a challenge for CP-ABE. This paper proposes an encryption access control (EAC) scheme to fulfill policy revocation which covers both attribute and user revocation. When one of the attributes in an access policy is changed by the data owner, the authorized users should be updated immediately because the revoked users who have gained previous access policy can observe the ciphertext. Especially for data owners, four types of updating policy levels are predefined. By classifying those levels, each secret token key is distinctly generated for each level. Consequently, a new secret key is produced by hashing the secret token key. This paper analyzes the execution times of key generation, encryption, and decryption times between non-revocation and policy revocation cases. Performance analysis for policy revocation is also presented in this paper."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Ciphertext Policy Attributes-Based Encryption (CP-ABE), Access Policy, Policy Revocation, Updating Policy Level"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2021-01-14"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "pwwm-ICAIT2020.pdf", "filesize": [{"value": "450 KB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_3", "mimetype": "application/pdf", "size": 450000.0, "url": {"url": "https://meral.edu.mm/record/7461/files/pwwm-ICAIT2020.pdf"}, "version_id": "224ec333-e0ed-482d-93cd-cb9a8009aa25"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "ICAIT 2020", "subitem_c_date": "4-5 November 2020", "subitem_conference_title": "2020 International Conference on Advanced Information Technologies (ICAIT)", "subitem_place": "University of Information Technology, Myanmar", "subitem_website": "https://ieeexplore.ieee.org/document/9261809"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Phyo Wah Wah Myint"}, {"subitem_authors_fullname": "Swe Zin Hlaing"}, {"subitem_authors_fullname": "Ei Chaw Htoon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2020-11-04"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "10.1109/ICAIT51105.2020.9261809"}, "item_title": "EAC: Encryption Access Control Scheme for Policy Revocation in Cloud Data", "item_type_id": "21", "owner": "107", "path": ["1608024197070"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000007461", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2021-01-14"}, "publish_date": "2021-01-14", "publish_status": "0", "recid": "7461", "relation": {}, "relation_version_is_last": true, "title": ["EAC: Encryption Access Control Scheme for Policy Revocation in Cloud Data"], "weko_shared_id": -1}
  1. University of Computer Studies, Taungoo
  2. Faculty of Computer Science

EAC: Encryption Access Control Scheme for Policy Revocation in Cloud Data

http://hdl.handle.net/20.500.12678/0000007461
http://hdl.handle.net/20.500.12678/0000007461
a957f6e3-2974-4259-8e5f-e4154d18f2bc
5bf0be05-6af2-47fc-ab83-8a5936ad4ae9
None
Preview
Name / File License Actions
pwwm-ICAIT2020.pdf pwwm-ICAIT2020.pdf (450 KB)
license.icon
Publication type
Conference paper
Upload type
Publication
Title
Title EAC: Encryption Access Control Scheme for Policy Revocation in Cloud Data
Language en
Publication date 2020-11-04
Authors
Phyo Wah Wah Myint
Swe Zin Hlaing
Ei Chaw Htoon
Description
Since a lot of information is outsourcing into cloud servers, data confidentiality becomes a higher risk to service providers. To assure data security, Ciphertext Policy Attributes-Based Encryption (CP-ABE) is observed for the cloud environment. Because ciphertexts and secret keys are relying on attributes, the revocation issue becomes a challenge for CP-ABE. This paper proposes an encryption access control (EAC) scheme to fulfill policy revocation which covers both attribute and user revocation. When one of the attributes in an access policy is changed by the data owner, the authorized users should be updated immediately because the revoked users who have gained previous access policy can observe the ciphertext. Especially for data owners, four types of updating policy levels are predefined. By classifying those levels, each secret token key is distinctly generated for each level. Consequently, a new secret key is produced by hashing the secret token key. This paper analyzes the execution times of key generation, encryption, and decryption times between non-revocation and policy revocation cases. Performance analysis for policy revocation is also presented in this paper.
Keywords
Ciphertext Policy Attributes-Based Encryption (CP-ABE), Access Policy, Policy Revocation, Updating Policy Level
Identifier 10.1109/ICAIT51105.2020.9261809
Conference papers
ICAIT 2020
4-5 November 2020
2020 International Conference on Advanced Information Technologies (ICAIT)
University of Information Technology, Myanmar
https://ieeexplore.ieee.org/document/9261809
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2021-01-14 08:25:30.095580
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL