Assured Update Scheme of Authorization for Cloud Data Access Based on Proxy Re-encryption

被引:0
作者
Su M. [1 ]
Wu B. [2 ,3 ]
Fu A.-M. [1 ]
Yu Y. [1 ]
Zhang G.-X. [1 ]
机构
[1] School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing
[2] State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing
[3] School of Cyber Security, University of Chinese Academy of Sciences, Beijing
来源
Su, Mang (sumang@njust.edu.cn) | 1600年 / Chinese Academy of Sciences卷 / 31期
基金
中国国家自然科学基金;
关键词
Assured update; Authorization management; Cipher text access control; Cloud computing; Proxy re-encryption;
D O I
10.13328/j.cnki.jos.005676
中图分类号
学科分类号
摘要
More and more people select cloud as an important tool for data storing, processing and sharing, as a result, the data in cloud increases rapidly, including some sensitive and privacy information. It is a vital problem to manage the authorizations of hosted data in cloud for confidentiality and effectiveness of access control. This study proposes a proxy re-encryption based assured update scheme of authorization for cloud data (PAUA) in light to solve the above mentioned problem. Firstly, the aims and assumptions of PAUA are given. Secondly, the system model and algorithm are shown. Finally, the comparisons with PAUA and the current status are carried out. The PAUA reduces the encryption and decryption work of personal users. Meanwhile, it ensures the permission updating by dividing the parameters of re-encryption key generation. © Copyright 2020, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:1563 / 1572
页数:9
相关论文
共 18 条
  • [1] Zhou L, Varadharajan V, Hitchens M., Trust enhanced cryptographic role-based access control for secure cloud data storage, IEEE Trans. on Information Forensics and Security, 10, 11, pp. 2381-2395, (2015)
  • [2] Zhu Y, Huang D, Hu CJ, Wang X., From RBAC to ABAC: Constructing flexible data access control for cloud storage services, IEEE Trans. on Services Computing, 8, 4, pp. 601-616, (2015)
  • [3] Rezaeibagha FY, Mu Y., Distributed clinical data sharing via dynamic access-control policy transformation, Int’l Journal of Medical Informatics, 89, pp. 25-31, (2016)
  • [4] Wang J, Huang CH, Wang JH., An access control mechanism with dynamic privilege for cloud storage, Journal of Computer Research and Development, 53, 4, pp. 904-920, (2016)
  • [5] Li J, Yao W, Zhang Y, Qian H, Han J, Flexible and fine-grained attribute-based data storage in cloud computing, IEEE Trans. on Service Computer, 10, 5, pp. 785-796, (2017)
  • [6] Li J, Yao W, Han J, Zhang Y, Shen J., User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage, IEEE Systems Journal, 12, 2, pp. 1767-1777, (2017)
  • [7] Ye J, Zhang W, Wu S, Gao Y, Qiu J, Attribute-based fine-grained access control with user revocation, Proc. of the ICT-EurAsia, pp. 586-595, (2014)
  • [8] Xu P, Jiao T, Wu Q, Wang W, Jin H., Conditional identity-based broadcast proxy re-encryption and its application to cloud email, IEEE Trans. on Computers, 65, 1, pp. 66-79, (2015)
  • [9] Zhang Y, Li J, Chen X, Li H., Anonymous attribute based proxy re-encryption for access control in cloud computing, Security and Communication Networks, 9, 14, pp. 2397-2411, (2016)
  • [10] Li J, Zhao X, Zhang Y, Yao W., Provably secure certificate-based conditional proxy re-encryption, Journal of Information Science and Engineering, 32, 4, pp. 813-830, (2016)