Provably Secure Data Access Control Protocol for Cloud Computing

被引:0
作者
Zhang, Ji [1 ,2 ,3 ]
Chen, Anmin [3 ]
Zhang, Ping [2 ,3 ]
机构
[1] China Airborne Missile Acad, Main Engine Dept, Luoyang 471009, Peoples R China
[2] Longmen Lab, Intelligent Syst Sci & Technol Innovat Ctr, Luoyang 471023, Peoples R China
[3] Henan Univ Sci & Technol, Sch Math & Stat, Luoyang 471000, Peoples R China
来源
SYMMETRY-BASEL | 2023年 / 15卷 / 12期
关键词
cloud computing; access control; DAC; STORAGE;
D O I
10.3390/sym15122111
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Currently, cloud storage servers are controlled by a third-party administrator. This semi-trusted approach gives rise to security concerns. Therefore, in cloud computing, some protocols use a key manager to encrypt the user's private data before uploading the data to the cloud. However, the security concerns that arise from the use of a key manager are not yet solved. In this respect, in this paper, a provably secure user cloud data access control protocol (DAC) is proposed based on existing cloud storage. Empirical tests confirm that the proposed approach is highly secure against adaptive selective ciphertext attacks and has excellent resistance to message attacks. A comprehensive performance evaluation, including time measurements, is conducted and the protocol is compared to other protocols, revealing the efficient file upload and download processes of the proposed approach. The results demonstrate the protocol's strong security, practicality, and operational efficiency.
引用
收藏
页数:16
相关论文
共 36 条
[1]  
Akhila M., 2016, Int. J. Sci. Res. Sci. Technol, V2, P111
[2]   SeDaSC: Secure Data Sharing in Clouds [J].
Ali, Mazhar ;
Dhamotharan, Revathi ;
Khan, Eraj ;
Khan, Samee U. ;
Vasilakos, Athanasios V. ;
Li, Keqin ;
Zomaya, Albert Y. .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :395-404
[3]   DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security [J].
Ali, Mazhar ;
Bilal, Kashif ;
Khan, Samee U. ;
Veeravalli, Bharadwaj ;
Li, Keqin ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) :303-315
[4]   DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party [J].
Ali, Mazhar ;
Malik, Saif U. R. ;
Khan, Samee U. .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (04) :642-655
[5]   Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems [J].
Amintoosi, Haleh ;
Nikooghadam, Mahdi ;
Kumari, Saru ;
Jun, Feng ;
Xiong, Hu ;
Kumar, Sachin ;
Rodrigues, Joel J. P. C. .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (07) :5368-5379
[6]  
[白利芳 Bai Lifang], 2020, [计算机科学, Computer Science], V47, P290
[7]   SACP: Secure Access Control Protocol [J].
Ben Daoud, Wided ;
Rekik, Malek ;
Meddeb-Makhlouf, Amel ;
Zarai, Faouzi ;
Mahfoudhi, Sami .
IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, :935-941
[8]   Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case [J].
Bian, Genqing ;
Chang, Jinyong .
IEEE ACCESS, 2020, 8 :102958-102970
[9]  
Boneh Dan, 2001, INT C THEORY APPL CR, V2248, P514
[10]   EPPDP: An Efficient Privacy-Preserving Data Possession With Provable Security in Cloud Storage [J].
Dhakad, Nandini ;
Kar, Jayaprakash .
IEEE SYSTEMS JOURNAL, 2022, 16 (04) :6658-6668