Implementing Secure Data Access Control for Multi-authority Cloud Storage System Using Ciphertext Policy-Attribute Based Encryption

被引:0
|
作者
Lekshmi, S. Vijaya [1 ]
Revathi, M. P. [2 ]
机构
[1] JJ Coll Engn & Technol, Dept Comp Sci & Engn, Tiruchirappalli, Tamil Nadu, India
[2] JJ Coll Engn & Technol, Tiruchirappalli, Tamil Nadu, India
来源
2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2014年
关键词
Access Control; CP-ABE; Decryption Outsourcing; Attribute Revocation; proxy re-encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. In a multi-authority Attribute Based Encryption scheme, multiple attribute-authorities monitor different sets of attributes and issue corresponding decryption keys to users, and encryptors can require that a user obtain keys for appropriate attributes from each authority before decrypting a message. Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control of shared data. In CP-ABE, each user is associated with a set of attributes and data are encrypted with access structures on attributes. A user is able to decrypt a ciphertext if and only if his attributes satisfy the ciphertext access structure. An important issue of attribute revocation is cumbersome for CP-ABE schemes. This challenging issue is considering by more practical scenarios in which semi-trustable on-line proxy servers are available. The proposed solution enables the multi-authority to revoke user attributes with minimal effort. This is achieve by uniquely integrating the technique of proxy re-encryption with CP-ABE, and enable the authority to delegate most of laborious tasks to proxy servers. The proposed scheme is provably secure against chosen ciphertext attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Multi-Authority Attribute-Based Encryption Access Control Scheme in Wireless Body Area Network
    Xiao, Min
    Hu, Xiaoyong
    2018 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS ENGINEERING (ICISE), 2018, : 39 - 45
  • [32] Toward Ciphertext Policy Attribute Based Encryption Model: A Revocable Access Control Solution in Cloud Computing
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2019), 2020, 12026 : 193 - 207
  • [33] An Approach for Advanced Multi-Authority Access Control System for Public Cloud Storage
    Rahangdale, Gangeshkumar C.
    Raut, Archana
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [34] Fine-Grained Access Control for Cloud Data Sharing by Secure and Efficient Attribute-Revocable Ciphertext-Policy Attribute-Based Encryption
    Vaanchig, Nyamsuren
    Chen, Wei
    Qin, Zhiguang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (10): : 303 - 319
  • [35] A new access control method based on multi-authority in cloud storage service
    Luo, Sheng
    Liu, Qiang
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2018, 11 (01) : 483 - 495
  • [36] HABEm: Hierarchical Attribute Based Encryption with Multi-Authority for the Mobile Cloud Service
    Qian, He
    Jing, Song
    Hong, Xu
    Yong, Wang
    2020 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2020, : 524 - 529
  • [37] An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage
    Li, Ximing
    Wang, Hao
    Ma, Sha
    COMPUTER STANDARDS & INTERFACES, 2025, 91
  • [38] SDSS-MAC: Secure data sharing scheme in multi-authority cloud storage systems
    Jiang, Rui
    Wu, Xianglong
    Bhargava, Bharat
    COMPUTERS & SECURITY, 2016, 62 : 193 - 212
  • [39] TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
    Li, Wei
    Xue, Kaiping
    Xue, Yingjie
    Hong, Jianan
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (05) : 1484 - 1496
  • [40] Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    SENSORS, 2018, 18 (05)