User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment

Nowadays, a lot of data is stored in the cloud for sharing purposes across various domains. The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. Advanced encryption and decryption techniques in cloud computing environment...

Full description

Saved in:
Bibliographic Details
Main Authors: Tarun Kumar, Prabhat Kumar, Suyel Namasudra
Format: Article
Language:English
Published: Universidad Internacional de La Rioja (UNIR) 2025-01-01
Series:International Journal of Interactive Multimedia and Artificial Intelligence
Subjects:
Online Access:https://www.ijimai.org/journal/bibcite/reference/3451
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841560813897252864
author Tarun Kumar
Prabhat Kumar
Suyel Namasudra
author_facet Tarun Kumar
Prabhat Kumar
Suyel Namasudra
author_sort Tarun Kumar
collection DOAJ
description Nowadays, a lot of data is stored in the cloud for sharing purposes across various domains. The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. Advanced encryption and decryption techniques in cloud computing environments can be considered useful to achieve this aspect. However, an unresolved yet critical challenge in cloud data-sharing systems is the revocation of malicious users. One of the common methods for revocation involves periodically updating users' private keys. This approach increases the workload of the Key Generation Center (KGC) as the number of users increases. In this work, an efficient Revocable Identity-Based Signature (RIBS) scheme is proposed, wherein the revocation functionality is delegated to an External Revocation Server (ERS). This proposed scheme allows only the non-revoked users to access the system resources, thus, providing restricted access control. Here, the ERS generates a secret time key for signature generation based on a revoked user list. In the proposed method, a user uses its private key and secret time key to sign a message. Furthermore, to maintain data confidentiality, symmetric encryption and Elliptic Curve Cryptography (ECC) based asymmetric encryption techniques are used before outsourcing data to the cloud server. The results illustrate that the proposed scheme outperforms some of the existing schemes by providing reduced computation costs.
format Article
id doaj-art-e1434821d9e5418d982cd24f98fc88fd
institution Kabale University
issn 1989-1660
language English
publishDate 2025-01-01
publisher Universidad Internacional de La Rioja (UNIR)
record_format Article
series International Journal of Interactive Multimedia and Artificial Intelligence
spelling doaj-art-e1434821d9e5418d982cd24f98fc88fd2025-01-03T15:20:35ZengUniversidad Internacional de La Rioja (UNIR)International Journal of Interactive Multimedia and Artificial Intelligence1989-16602025-01-019112713610.9781/ijimai.2024.05.001ijimai.2024.05.001User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing EnvironmentTarun KumarPrabhat KumarSuyel NamasudraNowadays, a lot of data is stored in the cloud for sharing purposes across various domains. The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. Advanced encryption and decryption techniques in cloud computing environments can be considered useful to achieve this aspect. However, an unresolved yet critical challenge in cloud data-sharing systems is the revocation of malicious users. One of the common methods for revocation involves periodically updating users' private keys. This approach increases the workload of the Key Generation Center (KGC) as the number of users increases. In this work, an efficient Revocable Identity-Based Signature (RIBS) scheme is proposed, wherein the revocation functionality is delegated to an External Revocation Server (ERS). This proposed scheme allows only the non-revoked users to access the system resources, thus, providing restricted access control. Here, the ERS generates a secret time key for signature generation based on a revoked user list. In the proposed method, a user uses its private key and secret time key to sign a message. Furthermore, to maintain data confidentiality, symmetric encryption and Elliptic Curve Cryptography (ECC) based asymmetric encryption techniques are used before outsourcing data to the cloud server. The results illustrate that the proposed scheme outperforms some of the existing schemes by providing reduced computation costs.https://www.ijimai.org/journal/bibcite/reference/3451cryptographydigital signatureselliptic curve cryptography (ecc)identity-based signaturerevocation
spellingShingle Tarun Kumar
Prabhat Kumar
Suyel Namasudra
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
International Journal of Interactive Multimedia and Artificial Intelligence
cryptography
digital signatures
elliptic curve cryptography (ecc)
identity-based signature
revocation
title User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
title_full User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
title_fullStr User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
title_full_unstemmed User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
title_short User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
title_sort user revocation enabled access control model using identity based signature in the cloud computing environment
topic cryptography
digital signatures
elliptic curve cryptography (ecc)
identity-based signature
revocation
url https://www.ijimai.org/journal/bibcite/reference/3451
work_keys_str_mv AT tarunkumar userrevocationenabledaccesscontrolmodelusingidentitybasedsignatureinthecloudcomputingenvironment
AT prabhatkumar userrevocationenabledaccesscontrolmodelusingidentitybasedsignatureinthecloudcomputingenvironment
AT suyelnamasudra userrevocationenabledaccesscontrolmodelusingidentitybasedsignatureinthecloudcomputingenvironment