Proxy re-encryption based multi-factor access control scheme in cloud

被引:0
作者
Su M. [1 ]
Shi G. [2 ]
Fu A. [1 ]
Yu Y. [1 ]
Jin W. [3 ]
机构
[1] School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing
[2] School of Information Security, Beijing Electronic Science and Technology Institute, Beijing
[3] Institute of Information Engineering, CAS, Beijing
来源
Tongxin Xuebao/Journal on Communications | 2018年 / 39卷 / 02期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Access control; Cloud computing; Multi-factor; Proxy re-encryption; Space-ground integration information network;
D O I
10.11959/j.issn.1000-436x.2018028
中图分类号
学科分类号
摘要
Cloud computing is one of the space-ground integration information network applications. Users can access data and retrieve service easily and quickly in cloud. The confidentiality and integrity of the data cloud have a direct correspondence to data security of the space-ground integration information network. Thus the data in cloud is transferred with encrypted form to protect the information. As an important technology of cloud security, access control should take account of multi-factor and cipher text to satisfy the complex requirement for cloud data protection. Based on this, a proxy re-encryption based multi-factor access control (PRE-MFAC) scheme was proposed. Firstly, the aims and assumptions of PRE-MFAC were given. Secondly, the system model and algorithm was defined. Finally, the security and properties of PRE-MFAC were analyzed. The proposed scheme has combined the PRE and multi-factor access control together and realized the multi-factor permission management of cipher text in cloud. Meanwhile, it can make the best possible use of cloud in computing and storing, then reduce the difficulty of personal user in cryptographic computing and key managing. © 2018, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:93 / 101
页数:8
相关论文
共 15 条
  • [1] Li F.H., Yin L.H., Wu W., Et al., Research status and development trends of security assurance for space-ground integration information network, Journal on Communications, 37, 11, pp. 156-168, (2016)
  • [2] Jha S., Sural S., Vaidya J., Et al., Security analysis of temporal RBAC under an administrative model, Computers & Security, 46, pp. 154-172, (2014)
  • [3] Yang L., Tang Z., Li R.F., Et al., Roles query algorithm in cloud computing environment based on user require, Journal on Communications, 32, 7, pp. 169-175, (2011)
  • [4] Luo J., Wang H., Gong X., Et al., A novel role-based access control model in cloud environments, International Journal of Computational Intelligence Systems, 9, 1, pp. 1-9, (2016)
  • [5] Li J.W., Squicciarini A., Lin D.J., Et al., SecLoc: securing location-sensitive storage in the cloud, The 20th ACM Symposium on Access Control Models and Technologies, pp. 51-61, (2015)
  • [6] Zhou L., Varadharajan V., Hitchens M., Trust enhanced cryptographic role-based access control for secure cloud data storage, IEEE Transactions on Information Forensics and Security, 10, 11, pp. 2381-2395, (2015)
  • [7] Zhou L., Varadharajan V., Gopinath K., A secure role-based cloud storage system for encrypted patient-centric health records, Computer Journal, 59, 11, pp. 1593-1611, (2016)
  • [8] Xu P., Jiao T., Wu Q., Et al., Conditional identity-based broadcast proxy re-encryption and its application to cloud email, IEEE Transactions on Computers, 65, 1, pp. 66-79, (2015)
  • [9] Zhang Y., Li J., Chen X., Et al., Anonymous attribute based proxy re-encryption for access control in cloud computing, Security and Communication Networks, 9, 14, pp. 2397-2411, (2016)
  • [10] Li J., Zhao X., Zhang Y., Et al., Provably secure certificate-based conditional proxy re-encryption, Journal of Information Science & Engineering, 32, 4, pp. 813-830, (2016)