Research on Access Control Based on CP-ABE Algorithm and Cloud Computing

Article Preview

Abstract:

Ciphertext-Policy Attribute-based encryption (CP-ABE) mechanism is an extension of attribute-based encryption which associates the ciphertext and user's private key with the attribute by taking the attribute as a public key. It makes the representation of the access control policy more flexible, thus greatly reduces the network bandwidth and processing overhead of sending node brought by fine-grained access control of data sharing. According to the principle of CP-ABE encryption mechanism for this mechanism, an improved cloud computing-based encryption algorithm was proposed in this paper to overcome the deficiencies of permission changing process under the massive data. Experimental results show that compared with traditional methods, the new mechanism significantly reduces time-consuming.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2273-2276

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Cachin C, Keidar I, Shraer A. Trusting the cloud[J]. Acm Sigact News, 2009, 40(2): 81-86.

DOI: 10.1145/1556154.1556173

Google Scholar

[2] Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]/Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006: 89-98.

DOI: 10.1145/1180405.1180418

Google Scholar

[3] Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]/Security and Privacy, 2007. SP'07. IEEE Symposium on. IEEE, 2007: 321-334.

DOI: 10.1109/sp.2007.11

Google Scholar

[4] Hong Cheng, Zhang Min, Feng Dengguo. AB-ACCS: A Cryptographic access control scheme for cloud storage [J]. Journal of Computer Research and Development, 2010, 47(1): 259-265.

Google Scholar

[5] Sun Guozi, Dong Yu, Li Yun. CP-ABE based data access control for cloud storage [J]. Journal on Communications, 2011, 32(7): 146-152.

Google Scholar

[6] Fu K E. Group sharing and random access in cryptographic storage file systems [D]. Massachusetts Institute of Technology, (1999).

Google Scholar

[7] Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography[M]/ Advances in Cryptology—EUROCRYPT'98. Springer Berlin Heidelberg, 1998: 127-144.

DOI: 10.1007/bfb0054122

Google Scholar

[8] Hadoop Streaming[EB/OL]. [2011-12-23]. http: / /hadoop. apache. org /common/docs /r0. 15. 2/streaming. html.

Google Scholar

[9] White T. Hadoop: the definitive guide[M]. O'Reilly, (2012).

Google Scholar