Attribute-based bilateral access control scheme for cloud storage

被引:0
|
作者
Li Q. [1 ,2 ,3 ]
Fan H. [1 ]
Chen W. [1 ]
Xiong J. [4 ]
Han L. [2 ]
Li R. [5 ]
机构
[1] School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing
[2] Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou
[3] Tongda College, Nanjing University of Posts and Telecommunications, Yangzhou
[4] College of Computer and Cyber Security, Fujian Normal University, Fuzhou
[5] The School of Computer Science and Technology, Xidian University, Xi’an
来源
Tongxin Xuebao/Journal on Communications | 2024年 / 45卷 / 04期
基金
中国国家自然科学基金;
关键词
adaptively secure; batch verification; bilateral access control; cloud storage; outsourced decryption;
D O I
10.11959/j.issn.1000-436x.2024062
中图分类号
学科分类号
摘要
In the existing cloud storage systems, the fine grained and bilateral access control schemes suffer from weak security model and unverifiable outsourced decryption result. To address this problem, an attribute-based bilateral access control scheme for cloud storage was proposed. Firstly, the formal definition and secure model of adaptively secure and verifiable outsourced bilateral CP-ABE was given. Secondly, combining with the batch verification technology, the attribute based bilateral access control scheme was constructed on the composite order groups, which enabled both the data owner and data user to simultaneously define the access policies for each other. Finally, the security analysis showed that the proposed scheme was indistinguishable and existential unforgeable under adaptive security models against chosen plaintext attacks and chosen message attacks, respectively. The experimental results show that the proposed scheme achieves high performance on the user side, where the computational overhead of matching, decryption, and verification is reduced. © 2024 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:128 / 136
页数:8
相关论文
共 21 条
  • [1] ZHANG Y H, DENG R H, XU S M, Et al., Attribute-based encryption for cloud computing access control: a survey, ACM Computing Surveys, 53, 4, pp. 1-41, (2021)
  • [2] SAHAI A, WATERS B., Fuzzy identity-based encryption, Advances in Cryptology, pp. 457-473, (2005)
  • [3] BETHENCOURT J, SAHAI A, WATERS B., Ciphertext-policy attribute-based encryption, Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
  • [4] YU S C, WANG C, REN K, Et al., Achieving secure, scalable, and fine-grained data access control in cloud computing, Proceedings of IEEE INFOCOM, pp. 1-9, (2010)
  • [5] ZHANG J W, MA J F, MA Z, Et al., Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing, Journal on Communications, 42, 10, pp. 81-94, (2021)
  • [6] GUO L F, XING X M, GUO H., An efficient traceable and revocable attribute-based encryption scheme in cloud storage, Journal of Cryptologic Research, 10, 1, pp. 131-145, (2023)
  • [7] NING J T, HUANG X Y, WEI L F, Et al., Tracing malicious insider in attribute-based cloud data sharing, Chinese Journal of Computers, 45, 7, pp. 1431-1445, (2022)
  • [8] LUO W P, FENG C S, ZOU L P, Et al., Attribute-based encryption scheme with fast encryption, Journal of Software, 31, 12, pp. 3923-3936, (2020)
  • [9] FENG T, CHEN L Q, FANG J L, Et al., Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption, Journal on Communications, 44, 5, pp. 224-233, (2023)
  • [10] MIAO Y B, TONG Q Y, CHOO K K R, Et al., Secure online/offline data sharing framework for cloud-assisted industrial Internet of things, IEEE Internet of Things Journal, 6, 5, pp. 8681-8691, (2019)