Multiple Access Control Struction for Cloud with Ciphertext

Article Preview

Abstract:

The attribute-based encryption scheme of cloud storage application environment helps achieve a flexible access control and confidentiality of the data. However, at present efficient and fine-grained access control can not be achieved. This is caused by the heavy re-encryption workload of data owner while attribute revocation. Besides, there is no solution to revoke user directly. By introducing key segmentation and proxy re-encryption technology to encrypt the part of the heavy work to the cloud service provider to perform, the new scheme greatly reduces the computational cost of data owner. In addition, a special attribute which the data owner controls independently is added to construct different attribute domains of CP-ABE so that the data owner can completely control of the user permissions. The new scheme not only can support multiple threshold fine access control policies, but also can achieve cancellation directly to the user as well as to the user attribute. Experimental results show that the new scheme is superior to the general scheme, achieve highly efficient, fine, and flexible access control.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

5888-5892

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] LARRY D. Cloud computing hasn't gone fortune 500 yet, but it's coming[EB/OL]. (2007-12-18)[2008-03-10].

Google Scholar

[2] CHRISTIAN C, IDIT K, SHRAER A. Trusting the cloud[J]. ACM SIGACT New, 2009, 40(2): 81-86.

DOI: 10.1145/1556154.1556173

Google Scholar

[3] Liang Xiaohui, Cao Zhenfu, Lin Huang, et al. Attribute based proxy re-encryption with delegating capabilities[C] / ASIACCS 2009. New York, NY, USA: ACM, 2009: 276-286.

DOI: 10.1145/1533057.1533094

Google Scholar

[4] PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure attribute-based systems[C] /Proc of ACM Conference onComputer and Communications Security. NewYork: ACM Press, 2006: 99-112.

DOI: 10.1145/1180405.1180419

Google Scholar

[5] BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryptio[C] . Washington DC: IEEE Computer Society, 2007: 321-334.

Google Scholar

[6] Yu Shucheng, Wang Cong, Ren Kui, et al. Attribute based data sharing with attribute revocation[C] / ASIACCS 2010. New York, NY, USA: ACM, 2010: 261-270.

DOI: 10.1145/1755688.1755720

Google Scholar

[7] Lv Zhiquan, Zhang Ming, Feng Dengguo. Cryptographic Access Control Scheme for Cloud Storage. Journal of Frontiers of Computer Science and Technology. 1673-9418/2011/05 (09)-0835-10.

Google Scholar

[8] Su Jinshu, Cao Yang, Wang Xiaofeng. Attribute Based Encryption Mechanism. Journal of SoftWare, 2011, 22(6): 1299-1315.

Google Scholar

[9] Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based ncryption[C] . Oakland, California, USA, 2007. Washington, DC, USA: IEEE Computer Society, 2007: 321-334.

DOI: 10.1109/sp.2007.11

Google Scholar

[10] LBRAIMI L, TANG Q, HARTEL P, et al. Efficient and provable secure ciphertext-policy attribute-based encryption schemes[C] /Proc of Information Security Practice and Experience. Berlin: Springer-Verlag, 2009: 1-12.

DOI: 10.1007/978-3-642-00843-6_1

Google Scholar