Federated Time-Bound Blockchain-Based Revocation with Ciphertext-Policy Attribute-Based Encryption and Redundant Shard Reassembly
Received: 24 July 2025 | Revised: 8 September 2025, 9 October 2025, and 22 October 2025 | Accepted: 6 November 2025 | Online: 26 December 2025
Corresponding author: Namrata Naikwade
Abstract
Ensuring data security, access revocation, and cost efficiency during data exchange becomes paramount in secure cloud computing. This study presents a secure data sharing framework that integrates Federated Time-Bound Ciphertext-Policy Attribute-Based Encryption (FTB-CP-ABE) along with blockchain-based revocation. On top of it, data is stored with fault-tolerant redundant sharding. The proposed FTB-CP-ABE enables data owners to define access policies and allows multiple attribute authorities to issue time-bound decryption keys in a decentralized manner. To enhance data security, encrypted data is divided into chunks (shards) using threshold secret sharing, which allows an authorized user to recover data even if some shards are lost. Blockchain is used to enforce transparent revocation and maintain audit trails, which allows logging keys that are revoked and why. In the decryption process, the user's key ID is checked against the ledger, and if the status is revoked, the system denies decryption even if the CP-ABE policy matches. The proposed multilayer framework provides auditable fine-grained access control in untrusted cloud environments.
Keywords:
cloud computing, data security, access revocation, federated time-bound ciphertext-policy attribute-based encryption (FTB-CP-ABE), blockchainDownloads
References
X. Wang et al., ''Attribute-Based Access Control Encryption,'' IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 3, pp. 2227–2242, May 2025. DOI: https://doi.org/10.1109/TDSC.2024.3481497
A. Thakur, V. Ranga, and R. Agarwal, ''Attribute-Based Encryption Scheme for Secure and Efficient Access in Blockchain,'' in 2024 IEEE International Conference for Women in Innovation, Technology & Entrepreneurship (ICWITE), Bangalore, India, Feb. 2024, pp. 653–658. DOI: https://doi.org/10.1109/ICWITE59797.2024.10502721
X. H. Liu, X. Y. Huang, W. Wu, and J. T. Ning, ''Key-Policy Attribute-Based Encryption Based on SM9,'' Journal of Computer Science and Technology, vol. 40, no. 1, pp. 267–282, Jan. 2025. DOI: https://doi.org/10.1007/s11390-024-3726-z
J. Bethencourt, A. Sahai, and B. Waters, ''Ciphertext-Policy Attribute-Based Encryption,'' in 2007 IEEE Symposium on Security and Privacy (SP ’07), Berkeley, CA, USA, May 2007, pp. 321–334. DOI: https://doi.org/10.1109/SP.2007.11
Y. Liao, G. Zhang, and H. Chen, ''Cost-Efficient Outsourced Decryption of Attribute-Based Encryption Schemes for Both Users and Cloud Server in Green Cloud Computing,'' IEEE Access, vol. 8, pp. 20862–20869, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.2969223
X. Yang, S. Lian, Y. Wang, and C. Chen, ''Attribute-Based Proxy Re-Encryption with Constant Size in Cloud Computing,'' in 2025 6th International Conference on Computing, Networks and Internet of Things (CNIOT), Shanghai, China, May 2025, pp. 1–5. DOI: https://doi.org/10.1109/CNIOT65435.2025.11070748
X. Qin, Y. Huang, Z. Yang, and X. Li, ''A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing,'' Journal of Systems Architecture, vol. 112, Jan. 2021, Art. no. 101854. DOI: https://doi.org/10.1016/j.sysarc.2020.101854
S. Zhao, R. Jiang, and B. Bhargava, ''RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage,'' IEEE Transactions on Services Computing, vol. 15, no. 2, pp. 1026–1035, Mar. 2022. DOI: https://doi.org/10.1109/TSC.2020.2973256
N. Chen, J. Li, Y. Zhang, and Y. Guo, ''Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage,'' IEEE Transactions on Computers, vol. 71, no. 1, pp. 175–184, Jan. 2022. DOI: https://doi.org/10.1109/TC.2020.3043950
P. Kanchanadevi, L. Raja, D. Selvapandian, and R. Dhanapal, ''An Attribute Based Encryption Scheme with Dynamic Attributes Supporting in the Hybrid Cloud,'' in 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, Oct. 2020, pp. 271–273. DOI: https://doi.org/10.1109/I-SMAC49090.2020.9243370
S. Wang, D. Zhang, Y. Zhang, and L. Liu, ''Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage,'' IEEE Access, vol. 6, pp. 30444–30457, 2018. DOI: https://doi.org/10.1109/ACCESS.2018.2846037
H. Hong and Z. Sun, ''An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing,'' Journal of Cloud Computing, vol. 5, no. 1, Dec. 2016, Art. no. 2. DOI: https://doi.org/10.1186/s13677-016-0052-1
J. Li, Y. Zhang, J. Ning, X. Huang, G. S. Poh, and D. Wang, ''Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT,'' IEEE Transactions on Cloud Computing, vol. 10, no. 2, pp. 762–773, Apr. 2022. DOI: https://doi.org/10.1109/TCC.2020.2975184
P. Sharma, R. Jindal, and M. D. Borah, ''Blockchain-based cloud storage system with CP-ABE-based access control and revocation process,'' The Journal of Supercomputing, vol. 78, no. 6, pp. 7700–7728, Apr. 2022. DOI: https://doi.org/10.1007/s11227-021-04179-4
I. Sukhodolskiy and S. Zapechnikov, ''A blockchain-based access control system for cloud storage,'' in 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Moscow, Russia, Jan. 2018, pp. 1575–1578. DOI: https://doi.org/10.1109/EIConRus.2018.8317400
M. Ali, N. Q. Soomro, H. Ali, A. Awan, and M. Kirmani, ''Distributed File Sharing and Retrieval Model for Cloud Virtual Environment,'' Engineering, Technology & Applied Science Research, vol. 9, no. 2, pp. 4062–4065, Apr. 2019. DOI: https://doi.org/10.48084/etasr.2662
V. Malamas, P. Kotzanikolaou, T. K. Dasaklis, and M. Burmester, ''A Hierarchical Multi Blockchain for Fine Grained Access to Medical Data,'' IEEE Access, vol. 8, pp. 134393–134412, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3011201
L. Yan, L. Ge, Z. Wang, G. Zhang, J. Xu, and Z. Hu, ''Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment,'' Journal of Cloud Computing, vol. 12, no. 1, Apr. 2023, Art. no. 61. DOI: https://doi.org/10.1186/s13677-023-00444-4
X. Li, H. Wang, S. Ma, M. Xiao, and Q. Huang, ''Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud,'' Cybersecurity, vol. 7, no. 1, Mar. 2024, Art. no. 18. DOI: https://doi.org/10.1186/s42400-024-00211-1
Z. Wu, Y. Zhang, and E. Xu, ''Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN,'' Future Internet, vol. 12, no. 1, Jan. 2020, Art. no. 15. DOI: https://doi.org/10.3390/fi12010015
Downloads
How to Cite
License
Copyright (c) 2025 Namrata Naikwade, Shafi Pathan, Prashant Dhotre

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
