Next Article in Journal
Managing Operational Efficiency and Reducing Aircraft Downtime by Optimization of Aircraft On-Ground (AOG) Processes for Air Operator
Previous Article in Journal
Acoustic Investigations of Two Barrel-Vaulted Halls: Sisto V in Naples and Aula Magna at the University of Parma
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficient Access Control for Video Anomaly Detection Using ABE-Based User-Level Revocation with Ciphertext and Index Updates

College of Computer Science, Chongqing University, Chongqing 400044, China
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2025, 15(9), 5128; https://doi.org/10.3390/app15095128
Submission received: 5 April 2025 / Revised: 25 April 2025 / Accepted: 1 May 2025 / Published: 5 May 2025
(This article belongs to the Special Issue Pattern Recognition in Video Processing)

Abstract

:
With the widespread deployment of video surveillance systems, effective access control is essential to enhance the accuracy and security of video anomaly detection. This paper proposes a Searchable and Revocable Attribute-Based Encryption scheme (ABE-RS) that is specifically designed for dynamic video anomaly detection scenarios. By integrating a user management tree structure, attribute-based key distribution, and keyword grouping techniques, the proposed scheme enables efficient user-level revocation along with dynamic updates to ciphertexts and keyword indexes. Furthermore, an inverted index structure is introduced to accelerate keyword search, facilitating the rapid detection and retrieval of anomalous video events. Formal security analysis demonstrates that the scheme is secure against chosen plaintext attacks (CPAs) and chosen keyword attacks (CKAs). The experimental results demonstrate that the scheme maintains millisecond-level revocation efficiency in methodology involving 512 users and either 50 attributes or a thousand keywords.

1. Introduction

In modern data outsourcing systems, owing to the rapid development and popularization of video surveillance technology, video anomaly detection [1] and event recognition have become hot research directions in computer vision. These technologies are important in improving public safety and optimizing urban operations. However, with the dramatic increase in data volume and diversification of access requirements, ensuring the security and privacy of video data has become particularly critical [2]. Attribute-based encryption (ABE) and public key searchable encryption (PEKS) technologies have shown unique advantages in this context, enabling data owners to securely encrypt data based on specific user attributes [3] or predetermined access policies while ensuring the searchability of the encrypted content [4].
Although these encryption schemes offer flexible data access control, they face challenges in dynamic environments, especially when user attributes or permissions change frequently [5,6]. For example, in video surveillance, when abnormal behavior or significant events are detected [7], it is essential to rapidly update access rights and search conditions [8,9] so that only authorized users can access and analyze the relevant video clips. Traditional ABE and PEKS schemes often require re-encrypting data or updating encryption keys for all affected users, increasing system complexity [10] and reducing operational efficiency.
To address these issues, this paper proposes a new ciphertext and keyword index update mechanism, which could be especially important in the context of video anomaly detection and behavior understanding. We utilize a user-managed tree structure to efficiently handle attribute and keyword revocation and updates, allowing the methodology to respond quickly to dynamic needs without sacrificing security or flexibility. This approach mitigates the limitations of traditional ABE and PEKS schemes and enhances the search efficiency of encrypted video data using inverted indexing.
In addition, considering that video data may contain personal private and sensitive information [11], this paper also explores how to effectively protect video content and prevent unauthorized access and data leakage through fine-grained permission control and encryption technology. This is especially important for anomaly detection and behavior analysis in public safety fields [12,13,14] such as urban monitoring and traffic management systems.
The widespread use of video surveillance systems has intensified the need for effective video data access control and privacy protection. The increase in the use of cloud services further complicates this, as dynamic changes in user attributes and search permissions demand rapid responses. In this context, we face the following two primary challenges:
  • Dynamic permission update. How do we update the ciphertext and keyword index in an efficient and timely manner without degrading the overall performance? In video surveillance systems, it is crucial to quickly adjust access rights after event detection.
  • Data security and privacy protection. How do we maintain strong data security and privacy protection during user attribute or keyword revocation, especially in an untrusted third-party environment?
These challenges require us to not only optimize the encryption and index update mechanism but also ensure that we can handle the high-speed video data stream generated while protecting privacy.
Compared to existing ABE-based revocation schemes that typically support either attribute-level or keyword-level revocation independently, our approach integrates both of these mechanisms into a unified framework suitable for dynamic environments like video surveillance. Unlike prior works that rely on time synchronization, periodic re-encryption, or static policies, our scheme supports real-time revocation and efficient encrypted searching without significant computational overhead. Moreover, by combining a user management tree with an inverted index structure, we achieve fine-grained access control and improved revocation efficiency at both the attribute and keyword levels, which is rarely addressed in existing works.
The main contributions of this paper include the following:
  • New revocation mechanism: We propose a new revocation method that combines the user management tree structure with attribute group key distribution and keyword grouping. This method is well-suited for dynamic access control in video surveillance systems, significantly reducing the overhead of attribute or keyword revocation.
  • Improved search efficiency: By integrating an inverted index structure, we enhance the efficiency of searching encrypted video data. Additionally, the combination of the covering subset method and the user management tree simplifies user attribute management complexity.
  • Enhanced security: The proposed fine-grained attribute and keyword revocation mechanism can quickly prevent unauthorized data access by revoked users, effectively strengthening data security in an untrusted third-party environment.

2. Related Work

In the domain of ABE, the dynamic and efficient revocation of users or attributes remains a significant challenge. Innovative CP-ABE schemes capable of immediate, rather than periodic, attribute revocation have been developed, as reported in [5,15]. The ABE framework is typically designed where attributes are shared among a group whose membership is in constant flux, underlining the need for robust revocation strategies.
In video data management [16], such attribute and keyword revocation mechanisms are particularly important for dynamically controlling access to video clips related to abnormal events [17,18,19], as seen in various surveillance applications including substations [7], remote monitoring via LoRaWAN [20], and smart home systems [21]. When a video analysis system detects a specific behavior pattern or an abnormal event, being able to quickly revoke or update permissions is critical to protecting the security and privacy of video content.

2.1. Attribute/User Revocation

The concept of attribute groups, introduced by Goyal et al. [22], enables fine-grained user revocation through a binary tree structure for managing group keys. Enhancements by Li et al. [15] and Cui et al. [23] improved efficiency. He et al. [24] addressed vulnerabilities in [22] related to collusion attacks and proposed a more secure scheme via binding user key segments. Fine-grained revocation is also supported by ABE with negation clauses, as seen in [25,26,27,28]. According to [5,29], even a single attribute group’s revocation can revoke access to the entire system. This is vital for applications like video anomaly detection and event recognition, where the dynamic control of video feed access is necessary. Efficient revocation that supports both attribute- and user-level revocations is crucial in real-world scenarios, as noted by Ghopur et al. [5], Chawla et al. [27], and Deng et al. [30].

2.2. Revocable Keyword Search

Revocable keyword search [31] is implemented in Scheme [32]; however, it requires time synchronization. To enhance flexibility and security, Wang et al. [33] proposed MD-AKS, which enabled revocable keyword search without trusted third parties or attribute-related overhead. This flexibility is critical in applications like video anomaly detection, where access to video segments needs rapid adjustment in response to real-time events. The techniques in [34,35] also involve re-encrypting the index, which requires synchronization between the owner and the user. Zhang et al. [36] introduced a public-key encryption scheme with ephemeral keyword search. This is especially relevant in video-based crowd analysis, where fast keyword updates are essential for monitoring crowd behaviors and detecting disruptive events. Ameri et al. [37] and others developed a time-controlled ABKS scheme for index encryption across multiple time intervals, though it does not prevent cloud servers from accessing the index without time information. Li et al. [38] introduced a DSSE scheme to enhance keyword search revocation with flexible shielding capabilities, ensuring robust privacy. Miao et al. [39] further enhanced keyword search revocation with a time-controlled scheme, which is vital for maintaining security in video surveillance systems.

2.3. Comparison with Existing Works

While many existing ABE schemes support revocation at either the user or attribute level, few provide a revocation for both attributes and keywords that simultaneously addresses dynamic ciphertext and index updates in applications such as video anomaly detection. Compared with schemes such as [24,31,35,37], which rely on time synchronization or re-encryption, our approach enables timely revocation and searchability without introducing heavy computational or synchronization overhead. Compared to revocation schemes using negation clauses [25,26,27,28], our approach achieves more efficient and flexible user-level revocation without modifying access policies. Compared with schemes that support user-level attribute revocation [15,23,30], our approach further introduces user-level keyword revocation. Under the post-search decryption model, our approach improves revocation efficiency and enhances security. In addition, few existing studies address revocable keyword searching, especially in combination with ABE techniques. Our approach introduces a novel use for the user management tree to revoke keyword index updates, while integrating an inverted index structure for efficient searching. This makes the proposed approach well-suited for accessing video surveillance data and revoking access to anomalies. The integration present in our methodology enables efficient user-level revocation and fine-grained keyword access control in dynamic security environments.
Organization: Section 3 covers the necessary preliminaries. Section 4 outlines the framework and security models. Section 5 provides a detailed construction of the proposed scheme. Section 6 presents the correctness and security analyses. Section 7 discusses the performance evaluation. Finally, Section 8 concludes the paper.

3. Preliminaries

3.1. Bilinear Pairings

Consider three cyclic groups G 1 , G 2 , and  G T , each of prime order p. A bilinear map e : G 1 × G 2 G T satisfies the following three conditions: (1) Bilinearity. For all elements g 1 G 1 , g 2 G 2 and integers a , b Z p , The map must satisfy the following: e ( g 1 a , g 2 b ) = e ( g 1 , g 2 ) a b . (2) Non-degeneracy. The map is non-degenerate, meaning that e ( g 1 , g 2 ) 1 for some pair ( g 1 , g 2 ) in G 1 × G 2 . (3) Computability. An efficient algorithm must exist to compute the pairing e ( g 1 , g 2 ) in polynomial time.

3.2. LSSS

Let U = { u 1 , u 2 , , u n } denote the set of attributes. A Linear Secret-Sharing Scheme (LSSS) Π over the finite field Z p , where p is a prime number, is defined as follows:
(1) Each share linked to an attribute is represented as a vector in Z p .
(2) A matrix M Z p n × h exists, which generates the shares for Π . The mapping ρ : { 1 , , n } U associates each row of the matrix M with a specific attribute. Let the vector v = ( s , r 2 , , r h ) represent the values, where s Z p is the secret and r 2 , , r h Z p are randomly selected values. The shares of the secret s are obtained by computing the product M v . Each share λ i = ( M v ) i is assigned to the attribute corresponding to ρ ( i ) .
An LSSS is characterized by a fundamental linear reconstruction property [40]. Specifically, given an LSSS Π , an access structure A, and an authorized set S A , let I = { i : ρ ( i ) S } represent the indices of the rows in M that correspond to the attributes in S, where I { 1 , , n } . If the shares λ i are valid for the secret s, there exist constants ω i Z p for each i I such that the secret can be reconstructed by the following linear combination of shares: i I ω i λ i = s .

3.3. BDH Assumption

The BDH problem in cryptography involves a bilinear group G with a generator g. Given g a , g b , g c Z p , where a , b , c are integers, The task is to compute e ( g , g ) a b c in the target group G T . Alternatively, given A = g a , B = g b , C = g c , compute e ( A , B ) c .
An algorithm A is considered to have an advantage ε in solving the BDH problem if the success probability is defined by the following:
Pr [ A ( p , G , G T , A , B , g c ) = e ( A , B ) c ] ε
The BDH assumption holds if, for all polynomial-time algorithms, ε is negligible, indicating the problem’s computational difficulty.

3.4. Attribute Group Key Distribution [41]

Consider T as a complete binary tree where each leaf node is assigned to a user from the set U = { u 1 , , u 8 } . As shown in Figure 1, The tree will be used to distribute attribute group keys to users in U . Each user securely receives a path key from a leaf node to the root node of the tree. Given the set of revoked users L = { u 5 , u 8 } , we mark the nodes in p a t h ( u 5 ) = { v 1 , v 3 , v 6 , v 12 } and p a t h ( u 8 ) = { v 1 , v 3 , v 7 , v 15 } . C o v e r ( L ) is defined as { v 2 , v 13 , v 14 } . Unrevoked users are represented by the leaf nodes covered in c o v e r ( L ) .
An example of the key revocation mechanism for attribute groups is as follows: if u 1 , u 2 , u 3 are associated with { x 1 , x 2 , x 3 } , { x 2 , x 3 } , and { x 1 , x 3 } ( x i S A ), respectively, The authority gives G y 1 = { u 1 , u 3 } , G y 2 = { u 1 , u 2 } , and G y 3 = { u 1 , u 2 , u 3 } to the data service manager.

4. Problem Formulation

In this section, we introduce the system model, define the proposed ABE-RS, and describe the security model. A summary of the commonly used notations can be found in Table 1.

4.1. System Model

As depicted in Figure 2, our system consists of the following four primary entities: Attribute Authority (AA), Data Owner (DO), Cloud Service Provider (CSP), and Data User (DU). A brief overview of each entity is provided as follows:
  • AA: The AA is a trusted entity that generates both the public and private parameters required for the system. Additionally, it validates the user’s attribute set and issues the corresponding private key. The AA ensures that only legitimate users who satisfy the defined access control policies can access and process the video data, significantly enhancing both the accuracy and security of video anomaly detection.
  • DO: The DO is responsible for uploading their data to the cloud service provided by the CSP. When uploading data, the DO clearly defines an access control policy tailored specifically to the video anomaly detection scenario and encrypts the data accordingly. A well-defined access control policy prevents unauthorized users from viewing sensitive anomalous events, thereby preserving the security and confidentiality of the anomaly detection process.
  • CSP: The CSP stores the encrypted data uploaded by the DO. In this scheme, the CSP is assumed to be “curious but honest”, meaning it might have an interest in the stored video data but will strictly follow the defined access control protocol, ensuring no unauthorized decryption or data leakage occurs.
  • DU: Each DU possesses a private key corresponding to its attribute set. Only when a non-revoked DU initiates a keyword-based query on video data can they successfully download and decrypt the latest encrypted video from the cloud, given their attributes precisely match the access control policy defined in the ciphertext.

4.2. Scheme Definitions

Consider U = { u 1 , u 2 , , u n } as the set of users in the framework. Let L = { 1 , 2 , , p } represent the set of descriptive attributes. For each attribute i, define G i U as the group of users possessing attribute i, which is called the attribute group. G i will serve as a list for granting or revoking access to attribute i. The collection of all such attribute groups is denoted by G = { G 1 , G 2 , , G p } . Finally, let K i be the key associated with the attribute group, shared by the users in G i who have not been revoked.
Definition 1.
  • Setup ( 1 κ , S A ) ( GP , MSK ) . It takes the security parameter κ and the attribute universe S A as input, and it outputs a public parameter GP and a master key MSK .
  • IdKgen ( GP , uid ) ( ISK uid , IPK uid ) . It takes as input the user identity uid with G P , and it outputs the id key pair ( ISK uid , IPK uid ) .
  • AttKgen ( GP , MSK , S , uid ) S K S , u i d . It takes an attributes set S S A , The uid, The GP, and the MSK as input, and it outputs the user–attributes secret key S K S , uid .
  • EncML ( G P , m , M , L ) C T M , L . It takes as input a message m, an access structure M , and a revocation list L with GP, and it outputs the ciphertext C T M , L
  • IdxEnc ( GP , S w ) I w . It takes as input the keyword set S w with GP, and it outputs the keyword index set I w .
  • AKgen ( GP , uid , ISK uid ) AK uid . It takes as input the user identity uid and secret key ISK uid , together with GP , and it outputs an authorization key AK uid .
  • Verify ( AK uid , IPK uid ) ( 0 , 1 ) . It takes the authorization key AK uid and the public id key IPK uid as input; it returns 1 if the user’s authentication passes and 0 if it does not.
  • Trapdgen ( GP , w ) T w . It takes a search keyword w with GP as input, and it outputs the trapdoor T w .
  • Search ( T w , I w ) ( 0 , 1 ) . It takes the trapdoor T w and the index I w as input; it returns 1 if there is a match and 0 if there is not.
  • Dec ( GP , CT M , L , SK S , uid ) M . It takes as input the ciphertext CT M , L and the secret key SK S , uid with GP, and it outputs the message M correctly if  S M and u i d L .
Correctness. The proposed ABE-RS scheme is correct if Verify , Search , and  Dec are successfully performed to recover the desired message M.

4.3. Security Model

(1) Message Confidentiality:
-
Setup: Challenger C executes Setup ( 1 κ ) to obtain ( G P , M S K ) , subsequently transmitting G P to adversary A .
-
Phase-1: Adversary A may repeatedly query the oracle O KeyGen ( S x , uid x ) for x [ 1 , U 1 ] . In responding, C generates S K uid x , S x KeyGen ( G P , M S K , S x , uid x ) and supplies S K uid x , S x to A .
-
Challenge:  A presents C with ( m 0 * , m 1 * ) , M * , and  L * . None of the identity–attribute pairs ( uid x , S x ) queried in Phase-1 can meet the criteria S x M * and uid x L * concurrently. C selects q randomly from { 0 , 1 } * , encrypts via C T * Encrypt ( G P , m q , M * , L * ) , and forwards C T * to A .
-
Phase-2:  A can query the oracle O KeyGen ( S x , uid x ) as in Phase-1, where x [ U 1 + 1 , U ] . Any of the queried identity–attribute pairs ( uid x , S x ) in Phase-2 cannot satisfy S x M * and uid x L * simultaneously.
A continues to access O KeyGen ( S x , uid x ) for x ranging from [ U 1 + 1 , U ] . Again, no queried identity–attribute pair ( uid x , S x ) should meet the criteria S x M * and uid x L * concurrently.
-
Guess:  A outputs a bit q .
If q = q , then A is deemed to have won the game. A ’s advantage is quantified as follows:
Adv A = Pr [ q = q ] 1 2 .
Definition 2
(IND-CPA secure). An ABE-RS scheme achieves indistinguishability under chosen plaintext attacks if the advantage Adv A , defined as the probability that any probabilistic polynomial-time (PPT) adversary A successfully distinguishes between encryptions of two chosen plaintexts, is negligible.
(2) Index Confidentiality: Our ABE-RS scheme ensures CKA security, guaranteeing that no index information is disclosed without the corresponding trapdoor, as detailed in reference [42]. The static corruption of the authority limits the adversary’s capacity to query any decryption keys crucial for decrypting the challenge ciphertext within a feasible timeframe.
The CKA security setup between a probabilistic polynomial-time (PPT) attacker, A , and a challenger, C , is structured as follows:
-
Setup:  C initializes the system by running the Setup ( λ ) algorithm, generating the global parameters G P that are then shared with A .
-
First Query Phase: During this phase, A makes a polynomial number of queries, which include the following:
(a)
Hash oracle queries ( H 2 , H 3 ):  A requests data from the hash oracles H 2 and H 3 .
(b)
Trapdoor generation:  A submits keywords to C , who then uses Trapdgen ( G P , w ) to generate and return the corresponding trapdoors.
-
Challenge:  A challenges C with a pair of previously unqueried keywords ( w 0 * , w 1 * ) , C randomly selects a bit q { 0 , 1 } and uses Idxgen ( G P , S w ) to produce the index I w q * , which is conveyed back to A .
-
Second query phase:  A continues to query as before, following the receipt of I w q * .
-
Guess:  A attempts to guess the bit q, with the experiment deemed successful if q = q . The advantage of A in this scenario is defined as follows:
Adv A cka ( n ) [ ( 1 λ ) ] = Pr [ q = q ] 1 2 .
Definition 3.
A revocable ABE-RS scheme with fast search is considered CKA-secure if the advantage Adv A cka ( 1 λ ) for any PPT adversary is negligible.

5. The Proposed Scheme

This section presents the formal definition and detailed construction of the proposed ABE-RS scheme.

5.1. Construction of ABE-RS

In this section, we outline our detailed scheme comprising ten algorithms. First, the AA executes the setup algorithm to initialize system parameters and establish essential access control structures for anomaly detection. Users run the IdKgen algorithm to obtain identity key pairs, enabling secure identity verification. The AA employs the AttKgen algorithm to generate attribute-based decryption keys, enforcing strict attribute-based access control over video surveillance data. The DO encrypts video data using the EncML algorithm, integrating a revocation list to swiftly deny access to malicious or anomalous users. The DO also employs the IdxEnc algorithm to construct a secure keyword index set I w , facilitating controlled and efficient keyword searches within encrypted video data. Subsequently, The DU executes the AKgen algorithm to obtain authorization keys for authentication, and it then runs the Trapdgen algorithm to create trapdoors T w for keyword queries, uploading them to the cloud server. Upon receiving queries, The cloud server performs the Verify algorithm to authenticate users. It then executes the Search algorithm to locate and return matching encrypted video files only to authorized users. Finally, The DU decrypts the retrieved ciphertext using the Dec algorithm if their attributes satisfy the defined access permissions.
As shown in Figure 3, The proposed ABE-RS scheme is a cryptographic protocol composed of ten logically sequential algorithms. These algorithms are executed in a well-defined order across different entities (AA, DU, DO, and CSP) as part of a theoretical security framework. Unlike real-time systems, The workflow does not involve time-sensitive or concurrent execution. Therefore, issues such as temporization failure or algorithm rescheduling are not applicable. Furthermore, each algorithm operates on distinct cryptographic inputs and does not rely on shared stateful resources, thus avoiding resource contention. This design ensures predictable and secure execution in practical implementation.

5.1.1. Setup

Setup ( 1 κ , S A ) ( GP , MSK ) . The process begins by generating a tuple of bilinear groups through G ( 1 κ ) { G , G T , p , g , e } , which is referred to as D , where G and G T are two cyclic groups of prime order p under multiplication, a generator g G , and a bilinear map e : G × G G T . Subsequently, The AA selects the parameters ( σ , α , β , γ ) from Z p * using LSSS, which computes g σ as the master secret key MSK. For each x S A , a random value n x Z p * is chosen. The global parameter GP is then defined as follows:
GP = { D , H 1 , H 2 , H 3 , Q x = g n x x S A , g α , g β , g γ } ,
where H 1 : { 0 , 1 } * Z p * , H 2 : { 0 , 1 } * G and  H 3 : G T { 0 , 1 } log p are the chosen hash functions.

5.1.2. ID Key Generation

IdKgen ( GP , uid ) ( ISK uid , IPK uid ) . Each DU is assigned a unique identity, denoted as uid , along with an associated attribute set S uid . A random element b Z p * is selected to compute the identity-based key pair as follows:
ISK uid = b , IPK uid = ( g μ ) H 1 ( uid b ) .
To ensure the identity privacy, DUs submit the public identity key IPK uid for registration, rather than revealing their uid .

5.1.3. Attribute Key Generation

AttKgen ( GP , MSK , S , uid ) S K S , u i d . Given a path path ( uid ) = { p uid , 0 , , p uid , d } in the full binary tree T, where p uid , 0 = root and p uid , d = uid , a random selection of t , u , u Z p is made. Additionally, elements R , R , R , R , { R x } x S G are chosen. The following computations are performed:
{ K 1 , y x = g σ g α t g β u g γ u H 1 ( y x ) R } y x p a t h ( u i d ) , { K 2 , x = Q x t R x } x S , K 3 = g u R , K 4 = g u R , K 5 = g t R .
The secret key S K S , uid corresponding to the user–attribute pair ( uid , S ) is then generated as ( S , { K 1 , y x } y x p a t h ( u i d ) , { K 2 , x } x S , K 3 , K 4 , K 5 ) .

5.1.4. Revocable Encryption

EncML ( G P , M , M , T ) C T M , T . The scheme M = ( A , ζ ) represents an LSSS where A Z p l × n is the share-generating matrix and ζ is a function mapping from [ l ] to S A . A random vector v = ( s , v 2 , , v n ) is chosen from Z p n , and a random value r j Z p is selected for each row A j of matrix A. The following computations are performed:
C 0 = M · e ( g , g ) σ s , C 1 = g s , C 2 = g β s , C 3 , R o o t = ( g γ H 1 ( R o o t ) ) s , C 4 , j = ( g α ) A j · v Q ζ ( j ) r j , C 5 , j = g r j j [ l ] .
The resulting ciphertext is given by C T M , T = ( M , T , C 0 , C 1 , C 2 , C 3 , R o o t , { C 4 , j , C 5 , j } j [ l ] ) .
The re-encrypted ciphertext is updated to C T M , L ( u p ) = ( M , L , C 0 , C 1 , C 2 , { C 3 , y x } y x c o v e r ( L ) ,   { C 4 , j , C 5 , j } j [ l ] ) , where L represents the user list of revocable attributes. The updated ciphertext for C 3 , y x is calculated as follows:
C 3 , y x = ( g γ H 1 ( y x ) ) s y x c o v e r ( L ) .

5.1.5. Revocable Index Generation

IdxEnc ( GP , S w ) I w . The DO extracts the keyword set S w = { w 1 , w 2 , , w ι } from the file collection F . The AA randomly selects a value π Z p * and transmits it to the DU in the secure channel. For each keyword w j in message M, The DU randomly selects a value ξ j Z p * and calculates the corresponding index component I w = { I 0 , I 1 , w j } w j S w as follows:
I 0 = g ξ j , I 1 , w j = H 3 e g β ξ j , H 2 ( w j ) π · H 1 ( R o o t ) .
The re-encrypted index is updated to I w ( u p ) = { I 0 , { I 1 , w j , y w ( u p ) } y w c o v e r ( L ) } w j S w , where L represents the user list of revocable keywords. The updated ciphertext for I 1 , w j , y w ( u p ) is calculated as follows:
I 1 , w j , y w ( u p ) = H 3 e g β ξ j , H 2 ( w j ) π · H 1 ( y w ) y w c o v e r ( L ) .

5.1.6. Authorization Key Generation

AKgen ( GP , uid , ISK uid ) AK uid . Before submitting a search query, The DU randomly selects a value b Z p * . Using this, the DU computes H 1 ( uid | | b ) , which generates the authentication key AK uid = ( AK 1 , AK 2 ) as
AK 1 = ( g α ) b ( g μ ) H 1 ( uid | | b ) , AK 2 = g b .

5.1.7. Verification

Verify ( AK uid , IPK uid ) ( 0 , 1 ) . The AA computes ( AK 2 ) α and validates the following equation:
M M AK 1 / ( AK 2 ) α = ? IPK uid .
If the equation holds true, The user’s authenticity is verified and the AA sends a secret value π Z p * to the authenticated user via a secure channel to proceed to the subsequent search step. Otherwise, The request is discarded.

5.1.8. Trapdoor Generation

Trapdgen ( GP , w ) T w . The DU constructs the trapdoor T w for searching the encrypted keyword dictionary S w . The DU chooses a random value τ Z p * and creates the trapdoor T w = { T 1 , T 2 , T 3 } . To search the encrypted keyword dictionary S w , The DU generates the trapdoor T w . This is performed by first selecting a random value τ Z p * and then constructing the trapdoor as T w = { T 1 , T 2 , T 3 } .
T 1 = H 3 e ( g β , ( g α ) τ ) , T 2 = g τ , T 3 , y w = H 2 ( w ) π · H 1 ( y w ) y w p a t h ( u i d ) ,
where w denotes the target keyword.

5.1.9. Search

Search ( T w , I w ( u p ) ) ( 0 , 1 ) . Upon receiving the trapdoor T w from the DU, The AA initiates a search for a keyword in the encrypted keyword dictionary S w , where the keyword w j is stored as I 1 , w j .
If a user u ϰ has a valid keyword w (that is, u ϰ G y w ), they can obtain the trapdoor component T 3 , y w from the right H 1 ( y w ) in Equation (13) using the unique intersection nodes Y . Since u ϰ L , it identifies a node Y ( p a t h ( u i d u ϰ ) c o v e r ( L ) ) . For example, if  c o v e r ( L ) = { u 1 , u 2 , u 3 , u 4 , u 6 , u 7 } in Figure 1, u 4 can compute the right T 3 , Y using the unique path-intersection nodes Y = v 2 .
The CSP then computes the values δ = H 3 ( e ( T 2 α , g β ) ) and θ = encode ( ( T 3 , Y ) β ) T 1 from the trapdoor and proceeds to compute the following:
H 3 ( e ( I 0 , decode ( θ δ ) ) ) = ? I 1 , w j , Y ( u p ) .
The search proceeds by verifying the equation. The dictionary S w serves as the header for the inverted index table. If a match is found, as indicated in Equation (14), it then continues the decryption operation.

5.1.10. Decrypt

Dec ( GP , CT M , L , SK S , uid ) m . Let S M = ( A , ζ ) and assume u i d L . The system computes I : { i : ζ ( i ) S } and { c i Z p } i I and the set { c i Z p } i I , such that i I c i · A i = ( 1 , 0 , , 0 ) .
Similarly to the process of creating the trapdoor during Search (Section 5.1.9), if a user u ϰ has a valid attribute x (that is, u ϰ G y x ), they can decrypt the attribute group key K 1 , y x from the right H 1 ( y x ) in Equation (6) using the unique intersection nodes Y. Since u ϰ L , it identifies a node Y ( p a t h ( u i d u ϰ ) c o v e r ( L ) ) . For example, if c o v e r ( L ) = { u 1 , u 2 , u 3 , u 4 , u 6 , u 7 } in Figure 1, u 4 can compute the right K 1 , Y by using the unique path-intersection nodes Y = v 2 . The decryption is calculated as follows:
e ( K 1 , Y , C 1 ) e ( K 3 , C 2 ) · e ( K 4 , C 3 , Y ) · j I e ( K 5 , C 4 , j ) · e ( K 2 , ζ ( j ) , C 5 , j ) c j = e ( g , g ) σ s . M = C 0 / e ( g , g ) σ s .

5.2. The Designed Fast Searchable Decryption Algorithm

As the core module of the ABE-RS framework, the FSD algorithm enables keyword-based search on encrypted data through the inverted index, as shown in Figure 4. The algorithm consists of InvertTable Initialization, Complete Inverted-Index Table, and Fast Searchable Decryption, which are shown in Algorithms 1 and 2.
  • InvertTable Initialization. The IIT is initialized as
InvertTable ={
LabelCipher(keyword): [] for keyword in keywordsList
}.
The DO extracts the keyword set S w and generates the encrypted tag cipher for each keyword w i . This structure creates an empty linked list container for each encrypted keyword I 1 , w i , which serves as the foundation for storing the encrypted data index in the subsequent steps.
  • Complete Inverted-Index Table. This process iterates through all encrypted keywords and constructs a comprehensive mapping between each keyword I w and its associated encrypted data C T M , L , as outlined in Algorithm 1.
Algorithm 1: Complete IIT
Applsci 15 05128 i001
Algorithm 2: Fast Searchable Decryption
Applsci 15 05128 i002
  • Fast Searchable Decryption. The fast searchable decryption of the FDS algorithm is shown in Algorithm 2. First, we verify the identity (line 1); then, based on T w , we find the entry in the InvertTable that matches the main key Main w (lines 2–3). If a matching ciphertext is found, we decrypt and verify the access rights, returning the decrypted message (lines 4–6); otherwise, the decryption fails or the search fails and it returns ⊥ (lines 7–10).

6. Analysis

In this section, we conduct correctness and security analyses.

6.1. Correctness Analysis

From Verify ’s Equation (12), we can obtain
A K 1 / ( A K 3 ) α = ( g α ) b ( g μ ) H 1 ( uid | | b ) / ( g b ) α = g μ H 1 ( uid | | b ) = IPK uid .
From Search ’s Equation (14), we can obtain
H 3 ( e ( I 0 , decode ( θ δ ) ) ) = H 3 ( e ( g ξ j , decode ( encode ( ( T 3 ) β ) H 3 ( e ( g β , ( ( g α ) τ ) ) ) H 3 ( e ( ( g τ ) α , g β ) ) ) ) ) = H 3 ( e ( g ξ j , decode ( encode ( ( T 3 ) β ) ) ) ) = H 3 ( e ( g β ξ j , H 2 ( w ) π · H 1 ( Y ) ) ) = I 1 , w j , Y ( u p ) .
From Dec ’s Equation (15), we can obtain
e ( K 1 , Y , C 1 ) e ( K 3 , C 2 ) · e ( K 4 , C 3 , Y ) = e ( g σ g α t g β u g γ u H 1 ( Y ) R , g s ) e ( g u R , g β s ) · e ( g u R , g s γ H 1 ( Y ) ) = e ( g , g ) s σ · e ( g , g ) s α t · e ( g , g ) s β u · e ( g , g ) s γ u H 1 ( Y ) e ( g , g ) s β u · e ( g , g ) u s γ H 1 ( Y ) = e ( g , g ) s σ · e ( g , g ) s α t ;
j I e ( K 5 , C 4 , j ) · e ( K 2 , ζ ( j ) , C 5 , j ) c j = j I e ( g t R , g α A j · v Q ζ ( j ) r j ) · e ( Q ζ ( j ) t R ζ ( j ) , g r j ) c j = j I e ( g , g ) α t A j · v e ( g , Q ζ ( j ) ) t r j · e ( g , Q ζ ( j ) ) t r j c j = e ( g , g ) j I α t c j A j · v = e ( g , g ) α t s .

6.2. Security Analysis

In this section, we analyze the security of ABE-RS against chosen plaintext attacks (CPAs) and chosen keyword attacks (CKAs).
Theorem 1.
The ABE-RS scheme is secure under IND-CPA conditions.
Proof. 
To establish the IND-CPA security of our ABE-RS framework, we utilize the encryption technique detailed in [41]. Here, we focus on the definitions of keys and ciphertexts. □
Key generation: The KeyGen ( G P , M S K , S , u i d ) algorithm is executed to generate S K S , u i d , which consists of { K 1 , y x } y x p a t h ( u i d ) , K 2 , K 3 , and { K 4 , x } x S . Additionally, a random value W G is selected. The key generation process is described as follows:
For every user identified by u i d and associated with an attribute set S, the process KeyGen ( G P , M S K , S , u i d ) generates a key S K S , u i d . This includes components { K 1 , y x } y x p a t h ( u i d ) , K 2 , K 3 , and { K 4 , x } x S . Additionally, a random element W from group G is integrated into each component to enhance the key’s complexity as follows:
{ K 1 , y x · W } y x p a t h ( u i d ) , K 2 , K 3 , { K 4 , x } x S .
Ciphertexts Construction. Executing Encrypt ( G P , m , M , L ) , we derive a ciphertext C T M , L ( u p ) that encapsulates C 0 , C 1 , and C 2 and structured data { C 3 , j , C 4 , j } j [ l ] and { C 5 , y x } y x c o v e r ( L ) . Random coefficients α , β , γ Z p * , along with vectors v = ( s , v 2 , , v n ) and sets { η x } x S A , { ϵ j } j [ l ] are chosen to form each encrypted component as follows:
C 0 , C 1 · g s , C 2 · g s β , { C 3 , y x · g c H 2 ( y x ) s } y x c o v e r ( L ) , { C 4 , j · g α A j · v g η δ ( j ) ϵ j , C 5 , j · g 2 ϵ j } j [ l ] .
Limiting the adversary to U key queries, a sequence of games from G a m e r e a l to G a m e f i n a l is set. The initial k games involve specialized keys and ciphertexts, shifting gradually to standard forms until U , where the ciphertext is encrypted with an arbitrary message.
This structured approach of transitioning through games illustrates the robustness of the encryption against distinguishing attacks, mimicking the methods established in Hur et al. [41].
Theorem 2.
Under the random oracle model and assuming the BDH assumption holds, the ABE-RS scheme is semantically secure against chosen keyword attacks.
Proof. 
A , as the PPT adversary, and C , as the challenger, are set to tackle the BDH problem with a determined advantage ε = 2 ε e q H 3 q T . Here, ε represents A ’s advantage, e is the natural logarithm base, and q H 3 and q T denote the maximum number of queries to the hash function H 3 and the trapdoor, respectively. □
-
Setup:  C is given a BDH challenge consisting of the tuple ( u 1 = g a , u 2 = g b , u 3 = g d G ) and is tasked with computing the value e ( g , g ) a b d G T . To initiate the process, C sets up the required cryptographic groups and parameters. Subsequently, C prepares the group G P , which includes the elements D , H 2 * , H 3 * , g α , g β , and shares these parameters with the adversary A . This information is provided to A to ensure the transparency of the challenge setup.
-
Query Phase 1: In this phase, A is allowed to make several polynomially bounded queries, which are outlined as follows:
(a)
H 2 query:  A is permitted to query the random oracle H 2 at any time. Initially, C creates an empty list to store entries for H 2 , which consist of tuples in the form ( w i , h i , e i , c i ) . Upon receiving a query from A for a keyword w i { 0 , 1 } * , C checks whether this keyword is already present in the list. If the entry exists, the value H 2 ( w i ) is returned as h i G . If the keyword is not yet listed, C randomly selects a value c i { 0 , 1 } , where Pr [ c i = 0 ] = 1 q T + 1 . After this, C stores the entry ( w i , h i , e i , c i ) in the list and returns H 2 ( w i ) = h i to A .
(b)
H 3 query:  A is also allowed to query the random oracle H 3 at any point during the interaction. To manage these queries, C initializes an empty list for H 3 , which stores entries in the form ( t i , V i ) . When A queries H 3 with an element t i G T , C checks whether t i is already present in the list. If the entry for t i exists, C returns the stored value H 3 ( t i ) = V i { 0 , 1 } log p . If no such entry is found, C randomly selects a new value V i { 0 , 1 } log p and assigns it to H 3 ( t i ) . The tuple ( t i , V i ) is then added to the list for future reference, and V i is returned to A .
(c)
Trapdoor query: In this phase, A submits keywords w i { 0 , 1 } * to C , for which it seeks trapdoors. Initially, C queries the oracle H 2 to retrieve the value H 2 ( w i ) = h i G and obtains the associated entry ( w i , h i , e i , c i ) .
If the value of c i is 0, C aborts. Otherwise, when c i = 1 , C proceeds by setting h i = g e i G , where e i is the value from the entry. Next, C selects a random value τ Z p * and queries the H 3 oracle with H 3 ( e ( g β , ( g α ) τ ) ) . Following this, C computes the components of the trapdoor as follows:
T 1 * = H 3 ( e ( g β , ( g α ) τ ) ) = H 3 ( e ( g , g ) β α τ ) , T 2 * = g τ , T 3 , y w * = H 2 ( w i ) π · H 1 ( y w ) = g e i π · H 1 ( y w ) .
Finally, C returns the trapdoor tuple T w * = ( T 1 * , T 2 * , T 3 * ) to A .
-
Challenge: In this phase, A presents a challenge consisting of a pair of keywords ( w 0 * , w 1 * ) , ensuring that neither of these keywords has been queried during the previous phase. Upon receiving the challenge pair, C proceeds by computing an index as follows:
C queries the oracle H 2 twice, obtaining the values h 0 and h 1 from the respective queries, such that H 2 ( w 0 ) = h 0 and H 2 ( w 1 ) = h 1 . Subsequently, C adds the corresponding entries ( w i , h i , e i , c i ) i = ( 0 , 1 ) to the H 2 list. If both c 0 and c 1 are equal to 0 or 1, C aborts the process.
Since at least one of c 0 or c 1 must be 0, C can then randomly choose a bit q { 0 , 1 } and set c q = 0 . This ensures that C has control over one of the entries while maintaining the integrity of the challenge.
Next, C constructs the keyword index I w * = ( I 0 * , I 1 , w j * ) in the following two steps: (1) C randomly selects a value t 2 Z p * and computes I 0 * = ( u 3 ) 1 / t 2 , ensuring the implicit condition ( ξ = d / t 2 ) holds, where d remains unknown to the challenger. (2) C then randomly chooses a value Z { 0 , 1 } log p and assigns it to I 1 , w j * = Z . Thus, C ensures that the generated index I w * is a valid index for the challenge keyword w q , satisfying the necessary conditions for the cryptographic protocol.
-
Query Phase 2: After obtaining the challenge index I w * , A can perform polynomial additional queries, which are processed identically to the initial ones.
-
Guess: At the conclusion of the second query phase, A outputs a guess, denoted by q for the bit q.
It is important to observe that in the query H 2 , the value of h i = u 2 e i is determined with a probability of ( 1 q T + 1 ) . Similarly, in the query H 3 , A determines the value with the same probability ( 1 q T + 1 ) . The process can be represented as follows:
e g β ξ , H 2 ( w q ) = e ( g a t 1 ) d / t 2 , g b e q = e ( g , g ) a b d ( e q t 1 / t 2 ) .
Next, C randomly picks a pair ( t i , V i ) from the H 3 list. It then calculates t e q t 1 / t 2 as its guess for the value e ( g , g ) a b d .
Probability Analysis: If the adversary A has a noticeable advantage in winning the experiment Exp A CKA ( 1 λ ) , then the challenger can solve the BDH problem with a probability of at least ( 2 ε / e q T q H 3 ) . Based on the BDH assumption outlined in Section 3, the probability ( 2 ε / e q T q H 3 ) is considered negligible, leading to the following conclusion:
If the adversary A has a non-negligible advantage in the experiment Exp A CKA ( 1 λ ) , then the challenger C would be able to solve the BDH problem with a probability of at least ( 2 ε / e q T q H 3 ) . Given the BDH assumption, the probability ( 2 ε / e q T q H 3 ) is considered negligible. This leads to the following conclusion:
P r [ Exp A CKA ( 1 λ ) ] = P r [ Exp C BDH ( 1 λ ) ] = 2 ε e q T q H 3 ε .
Thus, assuming the BDH assumption is valid, we conclude that the security of our scheme holds against CKAs.

7. Performance Evaluation

Based on both a theoretical analysis and the experimental tests, this section conducts an evaluation of ABE-RS.

7.1. Theoretical Analysis

In Table 2, we compare our scheme with others [26,30,31] in terms of public key size, secret key size, ciphertext size, and trapdoor size. The main storage overhead of the data owner comes from the public key, and the storage overhead of the data user comes from the secret key. Our public key is smaller than those in [26,30]. The size of our secret key is comparable to that in [30], which is linear in l o g V U . Regarding ciphertext size, our scheme incurs additional storage costs of ( V M + 2 + ι ) | G | + ι | log P | due to keyword encryption. This, however, facilitates more efficient search and decryption processes. In reference [31], the size of the trapdoor pertains to multiple keywords associated with a single user. In contrast, our scheme defines the size of the trapdoor in terms of a single keyword associated with multiple users.
We also compared our scheme with others [26,30,31] in terms of Setup, Keygen, Enc, ReEnc, Search, and Dec, as summarized in Table 3. As shown, scheme [26] incurs the highest setup overhead, while scheme [30] has the highest key generation cost. Moreover, our scheme supports a lower-overhead search compared to [31], allowing for the locating of ciphertexts containing the target keywords before decryption. Although the decryption cost per ciphertext is relatively high, the efficient search significantly reduces the overall cost and enables the precise decryption of the matched ciphertexts.

7.2. Experimental Tests

We implemented our ABE-RS scheme using the Charm-Crypto library (v0.5) [43] and the built-in SS512 elliptic curve with Python 3.8.10. Experiments were conducted on a server with an Intel Core i7 processor (2.11 GHz) and 11 GB RAM, running Ubuntu 20.04 LTS (64-bit). To ensure statistical stability and reliable performance evaluation, the results were averaged across 20 trials. Each trial was conducted independently, with the framework re-generating all relevant cryptographic elements—including public/private keys, ciphertexts, and index entries—using fresh random seeds.
First, we measured the execution time of the encryption, search, and decryption processes under varying numbers of attributes and keywords. The encryption time depends on the number of attributes defined by the data owner’s access policy and the number of extracted keywords. The search process, which is based on public-key searchable encryption, depends only on the size of the keyword dictionary. The decryption time is influenced solely by the number of attributes. As shown in Figure 5a, with the keyword dictionary size fixed at 500, both the encryption and decryption times increase with the number of attributes, while the search time remains approximately 676 ms. As shown in Figure 5b, with the number of attributes fixed at 50, the encryption and search times increase with the number of keywords, while the decryption time remains around 267 ms.
Figure 6 shows the computation time of attribute-group-based user revocation for different numbers of attributes. We set the number of system users to V U = 512 (with a tree depth of 10) and measured the revocation time when the user subset covered by the revoked attribute group contained 2 users. Deng et al. [30] pointed out in their experiments that, in certain scenarios, user-level revocation is more efficient than attribute-level revocation. In particular, when the number of users is fixed, revoking a single user is significantly faster than revoking all the attributes associated with that user. In our scheme, revoking the user subset covered by an attribute group achieves millisecond-level efficiency. Specifically, with 512 users and 50 attributes in the framework, revoking a single attribute group covering 2 users takes only 629 ms. Although the time required for a single ciphertext update and user revocation in our scheme is slightly higher than that in Deng’s scheme [30], our approach simultaneously revokes multiple users based on the attribute group coverage. Moreover, our scheme supports searchability and enables decryption after efficient keyword-group-based user revocation, resulting in improved overall revocation performance for the methodology.
Figure 7 shows the computation time of user revocation based on keyword groups under different numbers of keywords. We set the number of attributes in the framework to 10 and measured the revocation time when the user subset covered by the revoked keyword group contained two users. The results are compared with the two methods proposed by Liu [31]. For keyword-based user revocation, Liu’s RKS [31] method exhibits a relatively long running time, exceeding 10 s. In contrast, our method incurs lower computational overhead and performs comparably to Liu’s improved RKS+ method. Notably, when handling large-scale revocations, our scheme demonstrates better scalability and performance, achieving millisecond-level efficiency. Specifically, when the framework has 512 users and 1000 keywords, revoking a single keyword group covering 2 users takes approximately 1 s.
Through comparative analysis with the experiments of Deng [30] and Liu [31], it can be observed that our proposed scheme demonstrates superiority in user revocation based on both attribute and keyword group coverage. When dealing with different scenarios such as ciphertext (corresponding to user-level attribute revocation) and index updates (corresponding to keyword revocation), our scheme consistently maintains low computational overhead and exhibits strong scalability, making it well-suited for large-scale systems.

8. Conclusions

This paper proposes ABE-RS, a searchable and revocable attribute-based encryption scheme designed for dynamic video anomaly detection. By combining a user management tree with attribute and keyword revocation and incorporating an inverted index structure, ABE-RS enables fine-grained, flexible access control and an efficient encrypted search. The scheme is particularly effective in scenarios requiring frequent ciphertext and index updates, maintaining low computational overhead and strong scalability. Specifically, with 512 users in the system, revoking an attribute group covering two users takes only 629 ms, while revoking a keyword group covering two users among 1000 keywords requires approximately 1 s. Our scheme is well-suited for security-critical applications such as smart healthcare, video surveillance, urban public safety, intelligent transportation, and campus security, where rapid and secure access to sensitive content is essential.
Our framework demonstrates several strengths: (1) it supports both attribute- and keyword-level user revocation in a unified manner, which is rarely addressed in the existing literature; (2) it integrates a user management tree and an inverted index to enable efficient ciphertext and index updates, ensuring searchability even after revocation; and (3) it exhibits strong scalability and low computational overhead for both attribute and keyword revocation, as confirmed through comparative experiments with the methods from Deng et al. [30] and Liu et al. [31]. Specifically, when the dictionary contains 1000 keywords, the time required to revoke all users associated with a single keyword group remains at the millisecond level.
Nevertheless, the proposed approach has some limitations. These include the need for further optimization on resource-constrained devices (e.g., mobile or edge platforms), reliance on the random oracle model in the current security analysis, and the assumption of a single trusted authority. Additionally, the scheme has not yet been tested in real-world deployments.
Future work will address these limitations through the following: (1) improving efficiency for low-power environments; (2) extending the security model to standard cryptographic assumptions; (3) adopting a multi-authority ABE framework to reduce trust dependency; and (4) validating the system through real-world application testing.

Author Contributions

Conceptualization, X.L.; data curation, W.X. and X.W.; formal analysis, J.Y.; funding acquisition, X.L.; methodology, L.J. and X.W.; project administration, X.L.; resources, W.X.; software, L.J.; supervision, X.L.; validation, J.Y.; writing—original draft, L.J.; writing—review and editing, W.X., X.W. and X.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Natural Science Foundation of Chongqing (Innovation and Development Joint Fund) under grant CSTB2023NSCQ-LZX0149, in part by the Fundamental Research Funds for the Central Universities under grant 2023CDJKYJH019, in part by the General Program of the Natural Science Foundation of Chongqing under Grant CSTB2024NSCQ-MSX0479, in part by the Chongqing Postdoctoral Foundation Special Support Program under Grant 2023CQBSHTB3119, in part by the China Postdoctoral Science Foundation under Grant 2024MD754244, and in part by the Postdoctoral Fellowship Program of CPSF under Grant Number GZC20233322.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Song, J.; Nang, J. Pedestrian Abnormal Behavior Detection System Using Edge–Server Architecture for Large–Scale CCTV Environments. Appl. Sci. 2024, 14, 4615. [Google Scholar] [CrossRef]
  2. Choi, Y.R.; Kang, Y. Secure Delivery Method for Preserving Data Integrity of a Video Frame with Sensitive Objects. Appl. Sci. 2025, 15, 3533. [Google Scholar] [CrossRef]
  3. Wu, C.Y.; Huang, K.H.; Hsu, C.Y. A Decentralised Multi-Authority Attribute-Based Encryption for Secure and Scalable IoT Access Control. Appl. Sci. 2025, 15, 3890. [Google Scholar] [CrossRef]
  4. Yoon, H.; Yu, M.; Hahn, C.; Koo, D.; Hur, J. Exploiting Hidden Information Leakages in Backward Privacy for Dynamic Searchable Symmetric Encryption. Appl. Sci. 2024, 14, 2287. [Google Scholar] [CrossRef]
  5. Ghopur, D.; Ma, J.; Ma, X.; Hao, J.; Jiang, T.; Wang, X. Puncturable key-policy attribute-based encryption scheme for efficient user revocation. IEEE Trans. Serv. Comput. 2023, 16, 3999–4011. [Google Scholar] [CrossRef]
  6. Zhang, L.; Wang, J.; Mu, Y. Privacy-preserving flexible access control for encrypted data in Internet of Things. IEEE Internet Things J. 2021, 8, 14731–14745. [Google Scholar] [CrossRef]
  7. Chang, F.; Li, Q.; Wang, Y.; Zhang, W. Intelligent Video Surveillance Method for Digital Substation Based on Background Difference. In Proceedings of the 2021 International Conference on Information Control, Electrical Engineering and Rail Transit (ICEERT), Lanzhou, China, 30 October–1 November 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 105–108. [Google Scholar]
  8. Hao, J.; Tang, W.; Huang, C.; Liu, J.; Wang, H.; Xian, M. Secure data sharing with flexible user access privilege update in cloud-assisted IoMT. IEEE Trans. Emerg. Top. Comput. 2021, 10, 933–947. [Google Scholar] [CrossRef]
  9. Alshayeji, M.H.; Abed, S. Enhanced video-on-demand security in cloud computing against insider and outsider threats. Int. J. Secur. Netw. 2022, 17, 48–55. [Google Scholar] [CrossRef]
  10. Rasori, M.; La Manna, M.; Perazzo, P.; Dini, G. A survey on attribute-based encryption schemes suitable for the internet of things. IEEE Internet Things J. 2022, 9, 8269–8290. [Google Scholar] [CrossRef]
  11. Du, L.; Zhang, W.; Fu, H.; Ren, W.; Zhang, X. An efficient privacy protection scheme for data security in video surveillance. J. Vis. Commun. Image Represent. 2019, 59, 347–362. [Google Scholar] [CrossRef]
  12. Dionis-Ros, A.; Vila-Francés, J.; Magdalena-Benedito, R.; Mateo, F.; Serrano-López, A.J. Multimodal video analysis for crowd anomaly detection using open access tourism cameras. Appl. Sci. 2024, 14, 11075. [Google Scholar] [CrossRef]
  13. Zhou, M.; Wu, X.; Wei, X.; Xiang, T.; Fang, B.; Kwong, S. Low-light enhancement method based on a Retinex model for structure preservation. IEEE Trans. Multimed. 2023, 26, 650–662. [Google Scholar] [CrossRef]
  14. Zhou, M.; Zhao, X.; Luo, F.; Luo, J.; Pu, H.; Xiang, T. Robust rgb-t tracking via adaptive modality weight correlation filters and cross-modality learning. Acm Trans. Multimed. Comput. Commun. Appl. 2023, 20, 1–20. [Google Scholar] [CrossRef]
  15. Li, X.; Yang, G.; Xiang, T.; Xu, S.; Zhao, B.; Pang, H.; Deng, R.H. Make revocation cheaper: Hardware-based revocable attribute-based encryption. In Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 3109–3127. [Google Scholar]
  16. Yu, J.Y.; Kim, Y.; Kim, Y.G. Intelligent video data security: A survey and open challenges. IEEE Access 2021, 9, 26948–26967. [Google Scholar] [CrossRef]
  17. Zhou, M.; Lan, X.; Wei, X.; Liao, X.; Mao, Q.; Li, Y.; Wu, C.; Xiang, T.; Fang, B. An end-to-end blind image quality assessment method using a recurrent network and self-attention. IEEE Trans. Broadcast. 2022, 69, 369–377. [Google Scholar] [CrossRef]
  18. Zhou, M.; Chen, L.; Wei, X.; Liao, X.; Mao, Q.; Wang, H.; Pu, H.; Luo, J.; Xiang, T.; Fang, B. Perception-oriented U-shaped transformer network for 360-degree no-reference image quality assessment. IEEE Trans. Broadcast. 2023, 69, 396–405. [Google Scholar] [CrossRef]
  19. Zhou, M.; Shen, W.; Wei, X.; Luo, J.; Jia, F.; Zhuang, X.; Jia, W. Blind Image Quality Assessment: Exploring Content Fidelity Perceptibility via Quality Adversarial Learning. Int. J. Comput. Vis. 2025, 1–17. [Google Scholar] [CrossRef]
  20. Fort, A.; Peruzzi, G.; Pozzebon, A. Quasi-real time remote video surveillance unit for lorawan-based image transmission. In Proceedings of the 2021 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4. 0&IoT), Rome, Italy, 7–9 June 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 588–593. [Google Scholar]
  21. Stolojescu-Crisan, C.; Crisan, C.; Butunoi, B.P. Access control and surveillance in a smart home. High-Confid. Comput. 2022, 2, 100036. [Google Scholar] [CrossRef]
  22. Goyal, V.; Jain, A.; Pandey, O.; Sahai, A. Bounded ciphertext policy attribute based encryption. In Proceedings of the Automata, Languages and Programming: 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, 7–11 July 2008; Proceedings, Part II 35. Springer: Berlin/Heidelberg, Germany, 2008; pp. 579–591. [Google Scholar]
  23. Cui, H.; Yi, X. Secure Internet of Things in cloud computing via puncturable attribute-based encryption with user revocation. IEEE Internet Things J. 2023, 11, 3662–3670. [Google Scholar] [CrossRef]
  24. He, D.; Zeadally, S. Authentication protocol for an ambient assisted living system. IEEE Commun. Mag. 2015, 53, 71–77. [Google Scholar] [CrossRef]
  25. Song, Y.; Geng, Y.; Wang, J.; Gao, S.; Shi, W. Permission Sensitivity-Based Malicious Application Detection for Android. Secur. Commun. Netw. 2021, 2021, 6689486. [Google Scholar] [CrossRef]
  26. Ghopur, D.; Ma, J.; Ma, X.; Miao, Y.; Hao, J.; Jiang, T. Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation. Sci. China Inf. Sci. 2023, 66, 172104. [Google Scholar] [CrossRef]
  27. Chawla, S.; Gupta, N. A cloud based enhanced CPABE framework for efficient user and attribute-level revocation. Int. J. Comput. Appl. 2023, 45, 523–533. [Google Scholar] [CrossRef]
  28. Wang, Y.; Papadopoulos, D. Multi-user collusion-resistant searchable encryption for cloud storage. IEEE Trans. Cloud Comput. 2023, 11, 2993–3008. [Google Scholar] [CrossRef]
  29. Ge, C.; Susilo, W.; Baek, J.; Liu, Z.; Xia, J.; Fang, L. Revocable attribute-based encryption with data integrity in clouds. IEEE Trans. Dependable Secur. Comput. 2021, 19, 2864–2872. [Google Scholar] [CrossRef]
  30. Deng, S.; Yang, G.; Dong, W.; Xia, M. Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation. Multimed. Tools Appl. 2023, 82, 22251–22274. [Google Scholar] [CrossRef]
  31. Liu, S.; Miao, Y.; Li, F.; Li, X.; Choo, K.K.R.; Deng, R.H. Practical revocable keyword search over mobile cloud-assisted internet of things. IEEE Internet Things J. 2024, 11, 27494–27508. [Google Scholar] [CrossRef]
  32. Yu, Y.; Ni, J.; Yang, H.; Mu, Y.; Susilo, W. Efficient public key encryption with revocable keyword search. Secur. Commun. Netw. 2014, 7, 466–472. [Google Scholar] [CrossRef]
  33. Wang, J.; Zhang, R.; Li, J.; Xiao, Y. Owner-enabled secure authorized keyword search over encrypted data with flexible metadata. IEEE Trans. Inf. Forensics Secur. 2022, 17, 2746–2760. [Google Scholar] [CrossRef]
  34. Yang, Y.; Ma, M. Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans. Inf. Forensics Secur. 2015, 11, 746–759. [Google Scholar] [CrossRef]
  35. Xu, L.; Li, J.; Chen, X.; Li, W.; Tang, S.; Wu, H.T. Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things. J. Netw. Comput. Appl. 2019, 128, 11–20. [Google Scholar] [CrossRef]
  36. Zhang, X.; Xu, C.; Wang, H.; Zhang, Y.; Wang, S. FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things. IEEE Trans. Dependable Secur. Comput. 2019, 18, 1019–1032. [Google Scholar] [CrossRef]
  37. Ameri, M.H.; Delavar, M.; Mohajeri, J.; Salmasizadeh, M. A key-policy attribute-based temporary keyword search scheme for secure cloud storage. IEEE Trans. Cloud Comput. 2018, 8, 660–671. [Google Scholar] [CrossRef]
  38. Li, Z.; Ma, J.; Miao, Y.; Liu, X.; Choo, K.K.R. Forward and backward secure keyword search with flexible keyword shielding. Inf. Sci. 2021, 576, 507–521. [Google Scholar] [CrossRef]
  39. Miao, Y.; Li, F.; Li, X.; Liu, Z.; Ning, J.; Li, H.; Choo, K.K.R.; Deng, R.H. Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud. IEEE Trans. Mob. Comput. 2023, 23, 3650–3665. [Google Scholar] [CrossRef]
  40. Brakerski, Z.; Gentry, C.; Vaikuntanathan, V. (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theory (Toct) 2014, 6, 1–36. [Google Scholar] [CrossRef]
  41. Hur, J.; Noh, D.K. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 2010, 22, 1214–1221. [Google Scholar] [CrossRef]
  42. Yu, J.; Liu, S.; Xu, M.; Guo, H.; Zhong, F.; Cheng, W. An efficient revocable and searchable MA-ABE scheme with blockchain assistance for C-IoT. IEEE Internet Things J. 2022, 10, 2754–2766. [Google Scholar] [CrossRef]
  43. Charm-Crypto, T. Charm: A Framework for Rapidly Prototyping Cryptosystems. Available online: https://jhuisi.github.io/charm/ (accessed on 24 April 2025).
Figure 1. Binary tree for attribute group key distribution.
Figure 1. Binary tree for attribute group key distribution.
Applsci 15 05128 g001
Figure 2. System model.
Figure 2. System model.
Applsci 15 05128 g002
Figure 3. Workflow.
Figure 3. Workflow.
Applsci 15 05128 g003
Figure 4. Encrypted linked list index for fast search.
Figure 4. Encrypted linked list index for fast search.
Applsci 15 05128 g004
Figure 5. Latency of encryption, search, and decryption vs. attribute/keyword counts.
Figure 5. Latency of encryption, search, and decryption vs. attribute/keyword counts.
Applsci 15 05128 g005
Figure 6. Revocation performance of users covered by attribute groups.
Figure 6. Revocation performance of users covered by attribute groups.
Applsci 15 05128 g006
Figure 7. Revocation performance of users covered by the keyword groups.
Figure 7. Revocation performance of users covered by the keyword groups.
Applsci 15 05128 g007
Table 1. Notations.
Table 1. Notations.
NotationDescription
F = { M 1 , M 2 , M 3 , } DO’s multiple video data.
uid DU’s identity.
S A Attribute universe.
( ISK uid , IPK uid ) D U ’s ID key pair.
S K S , u i d User–attributes secret key.
LRevocation list.
CT M , L Ciphertext of M encrypted by D O .
C T M , L ( u p ) Updated ciphertext.
S w Keywords set.
I w Index of keywords encrypted by D O .
I w ( u p ) Updated index.
AK uid D U ’s authorization key.
T w Trapdoor of keywords encrypted by D U .
encode Encoding algorithm G { 0 , 1 } l o g p .
decode Decoding algorithm { 0 , 1 } l o g p G .
Table 2. Comparisons of storage overhead.
Table 2. Comparisons of storage overhead.
SchemePublic Key SizeSecret Key SizeCiphertext SizeTrapdoor Size
Deng [30] ( V A + l o g V L ) | G | + | G T | l o g V U | G | ( V M + l o g V U ) | G | + | G T |
Ghopur [26] ( ι + V A + 4 ) | G | + | G T | + | Z p | ( V L + ι + 2 ) | G | ( V M + 6 ) | G | + | G T | + | Z p |
Liu [31] V U | G | + V U | Z p | ( V U + ι + 2 V L + 2 ) | G | + | G T | ( 5 + V q ) | G |
Ours ( V A + 3 ) | G | + | G T | ( l o g V U + V A u + 3 ) | G | ( 2 V M + l o g V U + 2 + ι ) | G |
+ | G T | + ι | l o g p |
( l o g V U + 1 ) | G | + | l o g p |
V A : number of attributes in the system; V L : number of updates for the ciphertext; V U : number of users in the system; ι : number of keywords in the system; V M : number of rows of the LSSS matrix; V A u : number of attributes in S u i d ; | G | / | G T | / | Z p | : length of the elements in G , G T , and Z p , respectively; V L : number of revoked keywords; V q : number of query keywords.
Table 3. Comparisons of computational overhead.
Table 3. Comparisons of computational overhead.
SchemesSetupKeygenEncReEncSearchDec
Deng [30] V A t G + t P ( V M · l o g V U ) t G ( V M + l o g V L ) t G V M t G V D t G + V D t P
Ghopur [26] ( V A + ι + 6 ) t G
+ t G T + t P
( V A + ι + 3 ) t G
  + 2 t m G
( 2 V M + 7 ) t G + t P
  + ( 2 + 2 V M ) t m G
( 3 + 3 V L ) t G
  + 4 t m G
ι V L ( ( V M + 1 ) ( t m G T + t G T )
+ 3 t P ) ) + ( V L + V D + 1 ) t m G T
+ 2 ( V D + 1 ) t P
t G T + 2 t m G T
Liu [31] V U t G ( V U + 2 ι + 3 V L
  + 2 ) t G + t G T
( 3 V q + 3 ) t P + 2 V q V L t G
Ours ( V A + 3 ) t G
  + t P
( V M + l o g V U
  + 6 ) t G
( 3 V M + 2 l o g V U
  + 2 + 3 ι ) t G + t G T
+ V M t m G + ι t P
( V L + ι l o g V L ) t G
  + l o g V L t P
( V q + 1 ) t G + ( V q + 1 ) t P V D t G T + ( 2 V D + 3 ) t P
  + ( V D + 3 ) t m G T
t G / t G T : time for one exponentiation in group G and G T , respectively; t P : time for one pairing operation; t m G / t m G T : time for one multiplication in group G and G T , respectively; V D : number of attributes involved in decryption.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Jiang, L.; Yan, J.; Xian, W.; Wei, X.; Liao, X. Efficient Access Control for Video Anomaly Detection Using ABE-Based User-Level Revocation with Ciphertext and Index Updates. Appl. Sci. 2025, 15, 5128. https://doi.org/10.3390/app15095128

AMA Style

Jiang L, Yan J, Xian W, Wei X, Liao X. Efficient Access Control for Video Anomaly Detection Using ABE-Based User-Level Revocation with Ciphertext and Index Updates. Applied Sciences. 2025; 15(9):5128. https://doi.org/10.3390/app15095128

Chicago/Turabian Style

Jiang, Lu, Jielu Yan, Weizhi Xian, Xuekai Wei, and Xiaofeng Liao. 2025. "Efficient Access Control for Video Anomaly Detection Using ABE-Based User-Level Revocation with Ciphertext and Index Updates" Applied Sciences 15, no. 9: 5128. https://doi.org/10.3390/app15095128

APA Style

Jiang, L., Yan, J., Xian, W., Wei, X., & Liao, X. (2025). Efficient Access Control for Video Anomaly Detection Using ABE-Based User-Level Revocation with Ciphertext and Index Updates. Applied Sciences, 15(9), 5128. https://doi.org/10.3390/app15095128

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop