Generic user revocation systems for attribute-based encryption in cloud storage

被引:0
作者
Genlang CHEN
Zhiqian XU
Hai JIANG
Kuan-ching LI
机构
[1] Institute of Ningbo Technology, Zhejiang University
[2] Independent Scholar
[3] Department of Computer Science, Arkansas State University
[4] Department of Computer Science and Information Engineering, Providence University
关键词
Attribute-based encryption; Generic user revocation; User privacy; Cloud storage; Access control;
D O I
暂无
中图分类号
TP333 [存贮器]; TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Cloud-based storage is a service model for businesses and individual users that involves paid or free storage resources. This service model enables on-demand storage capacity and management to users anywhere via the Internet. Because most cloud storage is provided by third-party service providers, the trust required for the cloud storage providers and the shared multi-tenant environment present special challenges for data protection and access control. Attribute-based encryption(ABE) not only protects data secrecy, but also has ciphertexts or decryption keys associated with fine-grained access policies that are automatically enforced during the decryption process. This enforcement puts data access under control at each data item level. However, ABE schemes have practical limitations on dynamic user revocation. In this paper, we propose two generic user revocation systems for ABE with user privacy protection, user revocation via ciphertext re-encryption(UR-CRE) and user revocation via cloud storage providers(UR-CSP), which work with any type of ABE scheme to dynamically revoke users.
引用
收藏
页码:1362 / 1384
页数:23
相关论文
共 55 条
  • [21] Controlling Data in the Cloud:Outsourcing,Computation Without Outsourcing Control. CHOW R,GOLLE P,JAKOBSSON M,et al. Proceedings of ACM Cloud Computing Security Workshop . 2009
  • [22] Achieving secure, scalable, and fine-grained data access control in cloud computing. Yu S,Wang C,Ren K, et al. INFOCOM’’10 . 2010
  • [23] Attribute-based Fine-Grained Access Control with Efficient Revocation in Cloud Storage Systems. Yang Kan,Jia Xiao-hua,et al. Proc of ASIA CCS . 2013
  • [24] Attribute-based encryption with non-monotonic access structures. OSTROVSKY R,SAHAI A,WATERS B. The ACM Conf on Computer and Communications Security . 2007
  • [25] HOW TO SHARE A SECRET
    SHAMIR, A
    [J]. COMMUNICATIONS OF THE ACM, 1979, 22 (11) : 612 - 613
  • [26] Fully securefunctional encryption:Attribute-based encryption and(hierarchical)inner product encryption. Lewko A,Okamoto T,Sahai A,et al. LectureNotes in Computer Science . 2010
  • [27] A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. Emura K,Miyaji A,Nomura A,et al. Lecture Notes in Computer Science . 2009
  • [28] Efficient Ciphertext Policy Attribute-Based Encryption with Constant-SizeCiphertext and Constant Computation-Cost. Chen C,Zhang Z,Feng D. Lecture Notes in Computer Science . 2011
  • [29] Chosen-ciphertext security from identity-based encryption. CANETTI R,HALEVI S,KATZ J. Lecture Notes in Computer Science . 2004
  • [30] Secure attribute-based systems. PIRRETTI M,TRAYNOR P,MCDANIEL P,et al. The ACM Conf on Computer and Communications Security . 2006