Multi-authority proxy re-encryption based on CPABE for cloud storage systems

被引:0
作者
Xiaolong Xu [1 ]
Jinglan Zhou [1 ]
Xinheng Wang [2 ]
Yun Zhang [1 ]
机构
[1] College of Computer,Nanjing University of Posts and Telecommunications
[2] School of Computing,University of the West of Scotland
关键词
cloud storage; data partition; multi-authority; security; proxy re-encryption; attribute-based encryption(ABE);
D O I
暂无
中图分类号
TP309.7 [加密与解密]; TP333 [存贮器];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH).
引用
收藏
页码:211 / 223
页数:13
相关论文
共 4 条
[1]   云存储密文访问控制方案 [J].
吕志泉 ;
张敏 ;
冯登国 .
计算机科学与探索 , 2011, (09) :835-844
[2]   云计算安全研究 [J].
冯登国 ;
张敏 ;
张妍 ;
徐震 .
软件学报, 2011, 22 (01) :71-83
[3]  
Research of Cloud Storage and Improved Distributed Strategy of Data Storage[J] . Hui Yang,Shu Qiang Yuan,Feng Tao Liu,Jiong Chen,Chun Hua Zhou,Fang Wang,Zheng Xiang Shen.Applied Mechanics and Materials . 2014 (496)
[4]   Multi-authority attribute-based encryption with honest-but-curious central authority [J].
Bozovic, Vladimir ;
Socek, Daniel ;
Steinwandt, Rainer ;
Villanyi, Viktoria I. .
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89 (03) :268-283