Implementing Secure Data Access Control for Multi-authority Cloud Storage System Using Ciphertext Policy-Attribute Based Encryption

被引:0
|
作者
Lekshmi, S. Vijaya [1 ]
Revathi, M. P. [2 ]
机构
[1] JJ Coll Engn & Technol, Dept Comp Sci & Engn, Tiruchirappalli, Tamil Nadu, India
[2] JJ Coll Engn & Technol, Tiruchirappalli, Tamil Nadu, India
来源
2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2014年
关键词
Access Control; CP-ABE; Decryption Outsourcing; Attribute Revocation; proxy re-encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. In a multi-authority Attribute Based Encryption scheme, multiple attribute-authorities monitor different sets of attributes and issue corresponding decryption keys to users, and encryptors can require that a user obtain keys for appropriate attributes from each authority before decrypting a message. Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control of shared data. In CP-ABE, each user is associated with a set of attributes and data are encrypted with access structures on attributes. A user is able to decrypt a ciphertext if and only if his attributes satisfy the ciphertext access structure. An important issue of attribute revocation is cumbersome for CP-ABE schemes. This challenging issue is considering by more practical scenarios in which semi-trustable on-line proxy servers are available. The proposed solution enables the multi-authority to revoke user attributes with minimal effort. This is achieve by uniquely integrating the technique of proxy re-encryption with CP-ABE, and enable the authority to delegate most of laborious tasks to proxy servers. The proposed scheme is provably secure against chosen ciphertext attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A Multi-authority Attribute-Based Encryption Access Control for Social Network
    Yang, Xiao-dong
    Yang, Miao-miao
    Yang, Ping
    Leng, Qi
    CONFERENCE PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING (ICCSSE), 2017, : 671 - 674
  • [22] Improving Security Data Access Control for Multi-Authority Cloud Storage
    Wang, Jian
    Wu, Kehua
    Ye, Chunxiao
    Xia, Xiaofeng
    Fei Ouyang
    2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 608 - 613
  • [23] Lattice-based multi-authority ciphertext-policy attribute-based searchable with attribute revocation for cloud
    Shen, Xiajiong
    Li, Xiaoran
    Yin, Hongjian
    Cao, Chaoyang
    Zhang, Lei
    COMPUTER NETWORKS, 2024, 250
  • [24] Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
    Li, Yang
    Qi, Baoyue
    Wang, Mengmeng
    Zhu, Jianming
    Wang, Xiuli
    DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 105 - 124
  • [25] Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation
    Zhou, Junwei
    Duan, Hui
    Liang, Kaitai
    Yan, Qiao
    Chen, Fei
    Yu, F. Richard
    Wu, Jieming
    Chen, Jianyong
    COMPUTER JOURNAL, 2017, 60 (08) : 1210 - 1222
  • [26] A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain
    Xiaohong Zhang
    Wenqi Du
    Ata Jahangir Moshayedi
    The Journal of Supercomputing, 2023, 79 : 14743 - 14779
  • [27] A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain
    Zhang, Xiaohong
    Du, Wenqi
    Moshayedi, Ata Jahangir
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (13) : 14743 - 14779
  • [28] Multi-authority Based Weighted Attribute Encryption Scheme in Cloud Computing
    Wang, Yun
    Zhang, Dalei
    Zhong, Hong
    2014 10TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2014, : 1033 - 1038
  • [29] RETRACTED: Data Access Control for Multi-Authority Cloud Storage Systems (Retracted Article)
    Fu, Zhangjie
    Xin, Lin
    Wang, Jin
    Sun, Xingming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 714 - 717
  • [30] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme in Power Cloud Access Control
    Li, Yuancheng
    Zhang, Pan
    Wang, Boyan
    APPLIED SCIENCES-BASEL, 2018, 8 (10):