An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing

被引:5
作者
Ahuja, Rohit [1 ]
Mohanty, Sraban Kumar [1 ]
Sakurai, Kouichi [2 ]
机构
[1] Indian Inst Informat Technol Design & Mfg, Jabalpur 482005, India
[2] Kyushu Univ, Dept Informat, Fukuoka, Japan
来源
2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS) | 2016年
关键词
Access control; identity preserving; security; cloud computing; PRIVACY;
D O I
10.1109/AsiaJCIS.2016.23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of cloud computing motivates business organizations to migrate their complex data management systems from local servers to cloud servers for scalable and durable resources on pay per use basis. Considering enormous users and large amount of documents at cloud servers, there is a requirement of an access control scheme, which supports fine-grained cum flexible access control along with "Query-Response" mechanism to enable users to efficiently retrieve desired data from cloud servers. In addition, the scheme should support considerable flexibility to revoke system privileges from user, such as to restrict user from sharing or retrieving data or both, i.e., flexible system privilege revocation and most imperatively to preserve the identity of data owner and consumer, while sharing and retrieving data. Most of the access control schemes in cloud computing till date focus on restricting user from accessing data only. In this paper, we propose an identity preserving access control scheme to simultaneously realize the notion of scalability, fine-grained cum flexible access control, efficient data utilization, identity preserving and flexible system privilege revocation. We extend Ciphertext-Policy Attribute-Set-Based Encryption (CP-ASBE) in a hierarchical structure of users to achieve scalability. In addition, a hybridization of proxy re-encryption and CP-ASBE is introduced to materialize the concept of flexible system privilege revocation. Furthermore, we formally prove the security of our proposed scheme based on decisional bilinear Diffie-Hellman assumption. Efficacy of our scheme is depicted by performing comprehensive experiments.
引用
收藏
页码:39 / 47
页数:9
相关论文
共 17 条
[1]   Authentication in mobile cloud computing: A survey [J].
Alizadeh, Mojtaba ;
Abolfazli, Saeid ;
Zamani, Mazdak ;
Baharun, Sabariah ;
Sakurai, Kouichi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :59-80
[2]  
[Anonymous], IDENTITY BASED ENCRY
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Bobba R, 2009, LECT NOTES COMPUT SC, V5789, P587, DOI 10.1007/978-3-642-04444-1_36
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[6]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[7]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[8]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[9]   Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption [J].
Jung, Taeho ;
Li, Xiang-Yang ;
Wan, Zhiguo ;
Wan, Meng .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) :190-199
[10]   Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage [J].
Koo, Dongyoung ;
Hur, Junbeom ;
Yoon, Hyunsoo .
COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (01) :34-46