DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems

被引:190
作者
Yang, Kan [1 ,2 ]
Jia, Xiaohua [2 ]
Ren, Kui [3 ]
Zhang, Bo [2 ]
Xie, Ruitao [2 ]
机构
[1] Univ Sci & Technol China, Dept Comp Sci, Hefei 230027, Anhui, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[3] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
基金
美国国家科学基金会;
关键词
Access control; attribute revocation; CP-ABE; decryption outsourcing; multiauthority cloud; ATTRIBUTE-BASED ENCRYPTION; MULTI-AUTHORITY;
D O I
10.1109/TIFS.2013.2279531
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data access control is an effective way to ensure data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Existing access control schemes are no longer applicable to cloud storage systems, because they either produce multiple encrypted copies of the same data or require a fully trusted cloud server. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising technique for access control of encrypted data. However, due to the inefficiency of decryption and revocation, existing CP-ABE schemes cannot be directly applied to construct a data access control scheme for multiauthority cloud storage systems, where users may hold attributes from multiple authorities. In this paper, we propose data access control for multiauthority cloud storage (DAC-MACS), an effective and secure data access control scheme with efficient decryption and revocation. Specifically, we construct a new multiauthority CP-ABE scheme with efficient decryption, and also design an efficient attribute revocation method that can achieve both forward security and backward security. We further propose an extensive data access control scheme (EDAC-MACS), which is secure under weaker security assumptions.
引用
收藏
页码:1790 / 1801
页数:12
相关论文
共 28 条
[1]  
[Anonymous], 2009, NIST DEFINITION CLOU
[2]  
Benaloh Josh., 2009, P 2009 ACM WORKSHOP, P103, DOI DOI 10.1145/1655008.1655024
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[5]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[6]   Shared and searchable encrypted data for untrusted servers [J].
Dong, Changyu ;
Russello, Giovanni ;
Dulay, Naranker .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (03) :367-397
[7]  
Goh E.jin., 2003, PROC NETWORK DISTRIB, P131
[8]  
Goyal V., 2006, ACM CCS 2006, P89, DOI DOI 10.1145/1180405.1180418
[9]  
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47
[10]  
Green Matthew., 2011, USENIX SECURITY S, V2011