Implementing Secure Data Access Control for Multi-authority Cloud Storage System Using Ciphertext Policy-Attribute Based Encryption

被引:0
|
作者
Lekshmi, S. Vijaya [1 ]
Revathi, M. P. [2 ]
机构
[1] JJ Coll Engn & Technol, Dept Comp Sci & Engn, Tiruchirappalli, Tamil Nadu, India
[2] JJ Coll Engn & Technol, Tiruchirappalli, Tamil Nadu, India
来源
2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2014年
关键词
Access Control; CP-ABE; Decryption Outsourcing; Attribute Revocation; proxy re-encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. In a multi-authority Attribute Based Encryption scheme, multiple attribute-authorities monitor different sets of attributes and issue corresponding decryption keys to users, and encryptors can require that a user obtain keys for appropriate attributes from each authority before decrypting a message. Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control of shared data. In CP-ABE, each user is associated with a set of attributes and data are encrypted with access structures on attributes. A user is able to decrypt a ciphertext if and only if his attributes satisfy the ciphertext access structure. An important issue of attribute revocation is cumbersome for CP-ABE schemes. This challenging issue is considering by more practical scenarios in which semi-trustable on-line proxy servers are available. The proposed solution enables the multi-authority to revoke user attributes with minimal effort. This is achieve by uniquely integrating the technique of proxy re-encryption with CP-ABE, and enable the authority to delegate most of laborious tasks to proxy servers. The proposed scheme is provably secure against chosen ciphertext attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] A new access control method based on multi-authority in cloud storage service
    Luo S.
    Liu Q.
    International Journal of Computational Intelligence Systems, 2018, 11 (1) : 483 - 495
  • [42] A Survey on Secured Data Sharing using Ciphertext Policy Attribute Based Encryption in Cloud
    Thushara, G. A.
    Bhanu, S. Mary Saira
    2021 8TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS (ICSCC), 2021, : 170 - 177
  • [43] Revocation Basis and Proofs Access Control for Cloud Storage Multi-Authority Systems
    Riad, Khaled
    2016 THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND PATTERN RECOGNITION (AIPR), 2016,
  • [44] A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud
    Premkamal, Praveen Kumar
    Pasupuleti, Syam Kumar
    Alphonse, P. J. A.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (07) : 2693 - 2707
  • [45] A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud
    Praveen Kumar Premkamal
    Syam Kumar Pasupuleti
    P. J. A. Alphonse
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 2693 - 2707
  • [46] Toward Secure Data Storage in Web 3.0: Ciphertext-Policy Attribute-Based Encryption
    Gong, Bei
    Guo, Chong
    Liu, Yi-Jing
    Wang, Qian
    IEEE NETWORK, 2023, 37 (06): : 42 - 49
  • [47] Secure Lattice-Based Ciphertext-Policy Attribute-Based Encryption From Module-LWE For Cloud Storage
    Sravya, Gudipati
    kumar, Pasupuleti Syam
    Padmavathy, R.
    2023 IEEE 16TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD, 2023, : 554 - 556
  • [48] Multi-Authority Attribute-Based Encryption Scheme With Access Delegation for Cross Blockchain Data Sharing
    Duan, Pengfei
    Ma, Zhaofeng
    Gao, Hongmin
    Tian, Tian
    Zhang, Yuqing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 323 - 337
  • [49] Quorum and non-quorum based hierarchical multi-authority access control scheme for secure data sharing in cloud based environment
    Parte, Smita Athanere
    Thakur, Ramesh
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (03):
  • [50] Secure Efficient Revocable Large Universe Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT
    Huang, Kaiqing
    IEEE ACCESS, 2021, 9 : 53576 - 53588