Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data

被引:0
作者
Dong, Qiuxiang [1 ]
Huang, Dijiang [1 ]
Luo, Jim [2 ]
Kang, Myong [2 ]
机构
[1] Arizona State Univ, Tempe, AZ 85281 USA
[2] Naval Res Lab, Washington, DC 20375 USA
来源
2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2018年
关键词
Cloud Storage; Access Control; Encryption; CP-ABE; Discretionary Revocation; IAM; Directory;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud storage solutions have gained momentum in recent years. However, cloud servers can not be fully trusted. Data access control have becomes one of the main impediments for further adoption. One appealing approach is to incorporate the access control into encrypted data, thus removing the need to trust the cloud servers. Among existing cryptographic solutions, Ciphertext Policy Attribute-Based Encryption (CP-ABE) is well suited for fine-grained data access control in cloud storage. As promising as it is, user revocation is a cumbersome problem that impedes its wide application. To address this issue, we design an access control system called DUR-CP-ABE, which implements identity-based User Revocation in a data owner Discretionary way. In short, the proposed solution provides the following salient features. First, user revocation enforcement is based on the discretion of the data owner, thus providing more flexibility. Second, no private key updates are needed when user revocation occurs. Third, the proposed scheme allows for group revocation of affiliated users in a batch operation. To the best of our knowledge, DUR-CP-ABE is the first CP-ABE solution to provide affiliation-based batch revocation functionality, which fits naturally into organizations' Identity and Access Management (IAM) structure. The analysis shows that the proposed access control system is provably secure and efficient in terms of computation, communication and storage.
引用
收藏
页数:9
相关论文
共 32 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]  
Akinyele JosephA., 2011, P 1 ACM WORKSHOP SEC, P75, DOI DOI 10.1145/2046614.2046628
[3]  
[Anonymous], 2013, LECT NOTES COMPUTER
[4]  
[Anonymous], ANOTHER AMAZON AWS C
[5]  
[Anonymous], CIPHERTEXT POLICY AT
[6]  
[Anonymous], 1993, CRYPTO, DOI DOI 10.1007/3-540-48329-2
[7]  
[Anonymous], RELATIONAL LEARNING
[8]  
[Anonymous], HACKED DROPBOX LOGIN
[9]  
[Anonymous], TRACING FAKE NEWS FO
[10]  
[Anonymous], CCS07 P 14 ACM C