Generic user revocation systems for attribute-based encryption in cloud storage

被引:0
作者
Genlang CHEN
Zhiqian XU
Hai JIANG
Kuan-ching LI
机构
[1] Institute of Ningbo Technology, Zhejiang University
[2] Independent Scholar
[3] Department of Computer Science, Arkansas State University
[4] Department of Computer Science and Information Engineering, Providence University
关键词
Attribute-based encryption; Generic user revocation; User privacy; Cloud storage; Access control;
D O I
暂无
中图分类号
TP333 [存贮器]; TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Cloud-based storage is a service model for businesses and individual users that involves paid or free storage resources. This service model enables on-demand storage capacity and management to users anywhere via the Internet. Because most cloud storage is provided by third-party service providers, the trust required for the cloud storage providers and the shared multi-tenant environment present special challenges for data protection and access control. Attribute-based encryption(ABE) not only protects data secrecy, but also has ciphertexts or decryption keys associated with fine-grained access policies that are automatically enforced during the decryption process. This enforcement puts data access under control at each data item level. However, ABE schemes have practical limitations on dynamic user revocation. In this paper, we propose two generic user revocation systems for ABE with user privacy protection, user revocation via ciphertext re-encryption(UR-CRE) and user revocation via cloud storage providers(UR-CSP), which work with any type of ABE scheme to dynamically revoke users.
引用
收藏
页码:1362 / 1384
页数:23
相关论文
共 55 条
  • [1] Multi-authority ciphertext-policy attribute-based encryption with accountability. J.Li,Q.Huang,X.Chen,et al. Proceedings of the 6th ACM Symposium on Information,Computer and Communications Security . 2011
  • [2] Computing in the clouds[J] . Aaron Weiss. &nbspnetWorker . 2007 (4)
  • [3] Cloud computing
    Hayes, Brian
    [J]. COMMUNICATIONS OF THE ACM, 2008, 51 (07) : 9 - 11
  • [4] Cloud Computing: Will Commodity Services Benefit Users Long Term?[J] . Miller, H Gilbert,Veiga, John. &nbspIT Professional Magazine . 2009 (6)
  • [5] Fuzzy identity based encryption. SAHAI A,WATERS B. Lecture Notes in Computer Science . 2005
  • [6] Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    Guo, Minyi
    [J]. COMPUTERS & SECURITY, 2011, 30 (05) : 320 - 331
  • [7] Security Challenges for the Public Cloud
    Ren, Kui
    Wang, Cong
    Wang, Qian
    [J]. IEEE INTERNET COMPUTING, 2012, 16 (01) : 69 - 73
  • [8] Dynamic credentials and ciphertext delegation for attribute-based encryption. Sahai A,Seyalioglu H,Waters B. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . 2012
  • [9] Fully secure functional encryption with general relations from the decisional linear assumption. Okamoto T,Takashima K. Lecture Notes in Computer Science (including subseriesLecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . 2010
  • [10] Ensuring Data Storage Security in Cloud Computing. Wang C,Wang Q,Ren K, et al. 2009 17th International Workshop on Quality of Service . 2009