Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation

被引:12
|
作者
Zhou, Junwei [1 ]
Duan, Hui [2 ]
Liang, Kaitai [3 ]
Yan, Qiao [2 ]
Chen, Fei [2 ]
Yu, F. Richard [4 ]
Wu, Jieming [2 ]
Chen, Jianyong [2 ]
机构
[1] Wuhan Univ Technol, Comp Sci & Technol, Wuhan, Hubei, Peoples R China
[2] Shenzhen Univ, Dept Comp Sci & Software Engn, Shenzhen, Peoples R China
[3] Manchester Metropolitan Univ, Sch Comp Math & Digital Technol, Manchester, Lancs, England
[4] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON, Canada
来源
COMPUTER JOURNAL | 2017年 / 60卷 / 08期
基金
中国国家自然科学基金; 英国工程与自然科学研究理事会;
关键词
cloud storage; fine-grained access control; CP-ABE; multiple authorities; attribute revocation; PROXY RE-ENCRYPTION;
D O I
10.1093/comjnl/bxx017
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data outsourcing is a promising service for data owners, where their data are stored on a cloud storage provider. Since the cloud is not fully trusted, data access control has become a challenging issue in the Cloud Storage System (CSS). Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a feasible technique for ensuring access control in the CSS, where an attribute authority is responsible to manage attributes and distribute keys. In this paper, we propose a novel revocable Multi-Authority CP-ABE scheme, in which the access policy can be constructed as an arbitrary tree rather than a matrix used by existing schemes. The tree-like policy makes our scheme more flexible. Consequently, the encryption, decryption and attribute revocation operations are also more efficient. Our scheme is also proved to be secure under the standard assumption. It can resist user collusion attack, while the attribute revocation operation also achieves both forward security and backward security. Simulation results show that our scheme is highly efficient.
引用
收藏
页码:1210 / 1222
页数:13
相关论文
共 50 条
  • [31] Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    SENSORS, 2018, 18 (05)
  • [32] Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation
    Islam, Md Azharul
    Madria, Sanjay
    SECURITY AND PRIVACY, 2024, 7 (01)
  • [33] Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems
    Wei, Jianghong
    Chen, Xiaofeng
    Wang, Jianfeng
    Huang, Xinyi
    Susilo, Willy
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (02) : 552 - 566
  • [34] Fine-grained access control system based on fully outsourced attribute-based encryption
    Zhang, Rui
    Ma, Hui
    Lu, Yao
    JOURNAL OF SYSTEMS AND SOFTWARE, 2017, 125 : 344 - 353
  • [35] Improving Security Data Access Control for Multi-Authority Cloud Storage
    Wang, Jian
    Wu, Kehua
    Ye, Chunxiao
    Xia, Xiaofeng
    Fei Ouyang
    2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 608 - 613
  • [36] A fine-grained data access control algorithm in cloud computing
    Han, Dezhi
    Wu, Shuai
    Bi, Kun
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 245 - 248
  • [37] Efficient Data Access Control With Fine-Grained Data Protection in Cloud-Assisted IIoT
    Qi, Saiyu
    Lu, Youshui
    Wei, Wei
    Chen, Xiaofeng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04): : 2886 - 2899
  • [38] A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing
    Zhang, Zhishuo
    Huang, Wen
    Zhou, Shijie
    Liao, Yongjian
    Journal of Systems Architecture, 2022, 129
  • [39] Efficient Outsourced Data Access Control with User Revocation for Cloud-based IoT
    Hao, Jialu
    Huang, Cheng
    Liu, Jian
    Xian, Ming
    Shen, Xuemin
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [40] Efficient and scalable outsourced data access control with user revocation in cloud: A comprehensive study
    Debnath, S.
    Bhuyan, B.
    MULTIAGENT AND GRID SYSTEMS, 2018, 14 (04) : 383 - 401