Federated Time-Bound Blockchain-Based Revocation with Ciphertext-Policy Attribute-Based Encryption and Redundant Shard Reassembly

Authors

  • Namrata Naikwade Department of Computer Science and Engineering, MIT Art, Design and Technology University, Pune, Maharashtra, India
  • Shafi Pathan Department of Computer Science and Engineering, MIT Art, Design and Technology University, Pune, Maharashtra, India
  • Prashant Dhotre Department of Computer Science and Engineering, MIT Art, Design and Technology University, Pune, Maharashtra, India
Volume: 16 | Issue: 1 | Pages: 31022-31027 | February 2026 | https://doi.org/10.48084/etasr.13552

Abstract

Ensuring data security, access revocation, and cost efficiency during data exchange becomes paramount in secure cloud computing. This study presents a secure data sharing framework that integrates Federated Time-Bound Ciphertext-Policy Attribute-Based Encryption (FTB-CP-ABE) along with blockchain-based revocation. On top of it, data is stored with fault-tolerant redundant sharding. The proposed FTB-CP-ABE enables data owners to define access policies and allows multiple attribute authorities to issue time-bound decryption keys in a decentralized manner. To enhance data security, encrypted data is divided into chunks (shards) using threshold secret sharing, which allows an authorized user to recover data even if some shards are lost. Blockchain is used to enforce transparent revocation and maintain audit trails, which allows logging keys that are revoked and why. In the decryption process, the user's key ID is checked against the ledger, and if the status is revoked, the system denies decryption even if the CP-ABE policy matches. The proposed multilayer framework provides auditable fine-grained access control in untrusted cloud environments.

Keywords:

cloud computing, data security, access revocation, federated time-bound ciphertext-policy attribute-based encryption (FTB-CP-ABE), blockchain

Downloads

Download data is not yet available.

References

X. Wang et al., ''Attribute-Based Access Control Encryption,'' IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 3, pp. 2227–2242, May 2025. DOI: https://doi.org/10.1109/TDSC.2024.3481497

A. Thakur, V. Ranga, and R. Agarwal, ''Attribute-Based Encryption Scheme for Secure and Efficient Access in Blockchain,'' in 2024 IEEE International Conference for Women in Innovation, Technology & Entrepreneurship (ICWITE), Bangalore, India, Feb. 2024, pp. 653–658. DOI: https://doi.org/10.1109/ICWITE59797.2024.10502721

X. H. Liu, X. Y. Huang, W. Wu, and J. T. Ning, ''Key-Policy Attribute-Based Encryption Based on SM9,'' Journal of Computer Science and Technology, vol. 40, no. 1, pp. 267–282, Jan. 2025. DOI: https://doi.org/10.1007/s11390-024-3726-z

J. Bethencourt, A. Sahai, and B. Waters, ''Ciphertext-Policy Attribute-Based Encryption,'' in 2007 IEEE Symposium on Security and Privacy (SP ’07), Berkeley, CA, USA, May 2007, pp. 321–334. DOI: https://doi.org/10.1109/SP.2007.11

Y. Liao, G. Zhang, and H. Chen, ''Cost-Efficient Outsourced Decryption of Attribute-Based Encryption Schemes for Both Users and Cloud Server in Green Cloud Computing,'' IEEE Access, vol. 8, pp. 20862–20869, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.2969223

X. Yang, S. Lian, Y. Wang, and C. Chen, ''Attribute-Based Proxy Re-Encryption with Constant Size in Cloud Computing,'' in 2025 6th International Conference on Computing, Networks and Internet of Things (CNIOT), Shanghai, China, May 2025, pp. 1–5. DOI: https://doi.org/10.1109/CNIOT65435.2025.11070748

X. Qin, Y. Huang, Z. Yang, and X. Li, ''A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing,'' Journal of Systems Architecture, vol. 112, Jan. 2021, Art. no. 101854. DOI: https://doi.org/10.1016/j.sysarc.2020.101854

S. Zhao, R. Jiang, and B. Bhargava, ''RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage,'' IEEE Transactions on Services Computing, vol. 15, no. 2, pp. 1026–1035, Mar. 2022. DOI: https://doi.org/10.1109/TSC.2020.2973256

N. Chen, J. Li, Y. Zhang, and Y. Guo, ''Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage,'' IEEE Transactions on Computers, vol. 71, no. 1, pp. 175–184, Jan. 2022. DOI: https://doi.org/10.1109/TC.2020.3043950

P. Kanchanadevi, L. Raja, D. Selvapandian, and R. Dhanapal, ''An Attribute Based Encryption Scheme with Dynamic Attributes Supporting in the Hybrid Cloud,'' in 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, Oct. 2020, pp. 271–273. DOI: https://doi.org/10.1109/I-SMAC49090.2020.9243370

S. Wang, D. Zhang, Y. Zhang, and L. Liu, ''Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage,'' IEEE Access, vol. 6, pp. 30444–30457, 2018. DOI: https://doi.org/10.1109/ACCESS.2018.2846037

H. Hong and Z. Sun, ''An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing,'' Journal of Cloud Computing, vol. 5, no. 1, Dec. 2016, Art. no. 2. DOI: https://doi.org/10.1186/s13677-016-0052-1

J. Li, Y. Zhang, J. Ning, X. Huang, G. S. Poh, and D. Wang, ''Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT,'' IEEE Transactions on Cloud Computing, vol. 10, no. 2, pp. 762–773, Apr. 2022. DOI: https://doi.org/10.1109/TCC.2020.2975184

P. Sharma, R. Jindal, and M. D. Borah, ''Blockchain-based cloud storage system with CP-ABE-based access control and revocation process,'' The Journal of Supercomputing, vol. 78, no. 6, pp. 7700–7728, Apr. 2022. DOI: https://doi.org/10.1007/s11227-021-04179-4

I. Sukhodolskiy and S. Zapechnikov, ''A blockchain-based access control system for cloud storage,'' in 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Moscow, Russia, Jan. 2018, pp. 1575–1578. DOI: https://doi.org/10.1109/EIConRus.2018.8317400

M. Ali, N. Q. Soomro, H. Ali, A. Awan, and M. Kirmani, ''Distributed File Sharing and Retrieval Model for Cloud Virtual Environment,'' Engineering, Technology & Applied Science Research, vol. 9, no. 2, pp. 4062–4065, Apr. 2019. DOI: https://doi.org/10.48084/etasr.2662

V. Malamas, P. Kotzanikolaou, T. K. Dasaklis, and M. Burmester, ''A Hierarchical Multi Blockchain for Fine Grained Access to Medical Data,'' IEEE Access, vol. 8, pp. 134393–134412, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3011201

L. Yan, L. Ge, Z. Wang, G. Zhang, J. Xu, and Z. Hu, ''Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment,'' Journal of Cloud Computing, vol. 12, no. 1, Apr. 2023, Art. no. 61. DOI: https://doi.org/10.1186/s13677-023-00444-4

X. Li, H. Wang, S. Ma, M. Xiao, and Q. Huang, ''Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud,'' Cybersecurity, vol. 7, no. 1, Mar. 2024, Art. no. 18. DOI: https://doi.org/10.1186/s42400-024-00211-1

Z. Wu, Y. Zhang, and E. Xu, ''Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN,'' Future Internet, vol. 12, no. 1, Jan. 2020, Art. no. 15. DOI: https://doi.org/10.3390/fi12010015

Downloads

How to Cite

[1]
N. Naikwade, S. Pathan, and P. Dhotre, “Federated Time-Bound Blockchain-Based Revocation with Ciphertext-Policy Attribute-Based Encryption and Redundant Shard Reassembly”, Eng. Technol. Appl. Sci. Res., vol. 16, no. 1, pp. 31022–31027, Feb. 2026.

Metrics

Abstract Views: 190
PDF Downloads: 143

Metrics Information