Multi-authority attribute-based encryption access control model for cloud storage

被引:0
作者
Guan, Zhi-Tao [1 ]
Yang, Ting-Ting [1 ]
Xu, Ru-Zhi [1 ]
Wang, Zhu-Xiao [1 ]
机构
[1] School of Control and Computer Engineering, North China Electric Power University, Beijing
来源
Tongxin Xuebao/Journal on Communications | 2015年 / 36卷 / 06期
基金
中国国家自然科学基金;
关键词
Access control; Cloud storage; CP-ABE; Multi-authority;
D O I
10.11959/j.issn.1000-436x.2015142
中图分类号
学科分类号
摘要
The existing attribute-based encryption access control studies are mostly based on single authority, and this scheme is apt to be under attack to cause exposure of secret keys. Thus, a multi-authority access control model PRM-CSAC is proposed. Based on CP-ABE method, a multi-authority attribute-based encryption scheme is designed to improve security level. Minimized attribute grouping algorithm is designed to distribute keys to users according to needs, which can reduce unnecessary attribute key distribution and decrease the amount of re-encryption attributes. The read and write attribute are added to strengthen the control of owners. The analysis shows that the proposed scheme can meet the security requirement of access control in cloud, and it also has less response time and system cost. ©, 2015, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页数:11
相关论文
共 19 条
[1]  
Li R.X., Dong X.H., Gu X.W., Et al., Overview of the data security and privacy preserving of mobile cloud services, Journal on Communications, 34, 12, pp. 159-166, (2013)
[2]  
Feng D.G., Zhang M., Zhang Y., Et al., Study on cloud computing security, Journal of Software, 22, 1, pp. 71-83, (2011)
[3]  
Shamir A., Identity-based cryptosystems and signature schemes, Advances in Cryptology, pp. 47-53, (1985)
[4]  
Sahai A., Waters B., Fuzzy identity-based encryption, Advances in Cryptology-EUROCRYPT 2005, pp. 557-557, (2005)
[5]  
Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for fine grained access control of encrypted data, CCS, pp. 89-98, (2006)
[6]  
Su J.S., Cao D., Wang X.F., Et al., Attribute-based encryption schemes, Journal of Software, 22, 6, pp. 1299-1315, (2011)
[7]  
Yu S., Wang C., Ren K., Lou W., Achieving secure, scalable, and fine-grained data access control in cloud computing, IEEE INFOCOM, pp. 1-9, (2010)
[8]  
Yu N.H., Hao Z., Xu J.J., Et al., Review of cloud computing security, Acta Electronica Sinica, 41, 2, pp. 371-381, (2013)
[9]  
Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, IEEE S&P, pp. 321-334, (2007)
[10]  
Wang G.J., Liu Q., Wu J., Hierarchical attribute-based encryption for fine-grained access control in cloud storage services, CCS, pp. 735-737, (2010)