Fine-Grained Access Control with Efficient Revocation in Cloud Storage

Article Preview

Abstract:

In the cloud storage system, the server is no longer trusted, which is different from the traditional storage system. Therefore, it is necessary for data owners to encrypt data before outsourcing it for sharing. Simultaneously, the enforcement of access policies and support of policies updates becomes one of the most challenging issues. Ciphertext-policy attribute-based encryption (CP-ABE) is an appropriate solution to this issue. However, it comes with a new obstacle which is the attribute and user revocation. In this paper, we propose a fine-grained access control scheme with efficient revocation based on CP-ABE approach. In the proposed scheme, we not only realize an efficient and immediate revocation, but also eliminate some burden of computational overhead. The analysis results indicate that the proposed scheme is efficient and secure for access control in cloud storage systems.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

79-89

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] A. Sahai and B. Waters: Fuzzy Identity Based Encryption. In Eurocrypt 2005, pages 457-473. Springer, (2005).

DOI: 10.1007/11426639_27

Google Scholar

[2] V. Goyal, O. Pandey, A. Sahai and B. Waters: Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In ACM Conference on Computer and Communications Security 2006, pages. 89-98, (2006).

DOI: 10.1145/1180405.1180418

Google Scholar

[3] J. Bethencourt, A. Sahai and B. Waters: Ciphertext-Policy Attribute-Based Encryption. In IEEE Symposium on Security and Privacy 2007, pages. 321-334, (2007).

DOI: 10.1109/sp.2007.11

Google Scholar

[4] L. lbraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker: Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. In International Workshop Information Security Applications 2009, pages 309-323, (2009).

DOI: 10.1007/978-3-642-10838-9_23

Google Scholar

[5] B. Waters: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In Public Key Cryptography 2011, vol. 6571, pages 53-70, Springer, (2011).

DOI: 10.1007/978-3-642-19379-8_4

Google Scholar

[6] J. Hur and D. K. Noh: Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems. In IEEE Transactions on Parallel and Distributed Systems, vol. 22, No. 7, pages. 1214-1221, (2011).

DOI: 10.1109/tpds.2010.203

Google Scholar

[7] S. Yu, C. Wang, K. Ren, W. Lou: Attribute Based Data Sharing with Attribute Revocation. In ASIACCS'10, pages. 261-270, (2010).

DOI: 10.1145/1755688.1755720

Google Scholar

[8] J. Hur: Improving Security and Efficiency in Attribute-Based Data Sharing. In IEEE Transactions on Knowledge and Data Engineering, vol. 25, No. 10, pages. 2271-2282, (2011).

DOI: 10.1109/tkde.2011.78

Google Scholar

[9] R. Bobba, H. Khurana and M. Prabhakaran: Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption. In European Symposium on Research in Computer Security 2009, LNCS 5789, pages. 587-604, (2009).

DOI: 10.1007/978-3-642-04444-1_36

Google Scholar

[10] S. Rafaeli, D. Hutchison: A Survey of Key Management for Secure Group Communication. In ACM Computing Surveys, vol. 35, No. 3, pages. 309-329, (2003).

DOI: 10.1145/937503.937506

Google Scholar

[11] S. Yu, C. Wang, K. Ren and W. Lou: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In IEEE INFOCOM 2010 Proceedings, pages. 1-9, (2010).

DOI: 10.1109/infcom.2010.5462174

Google Scholar

[12] J. Hur, D. Koo, S. O. Hwang and K. Kang: Removing Escrow from Ciphertext Policy Attribute-Based Encryption. In Computers and Mathematics with Applications 2013, vol. 65, No. 9, pages. 1310-1317, (2013).

DOI: 10.1016/j.camwa.2012.02.005

Google Scholar