A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage

被引:25
作者
Ahuja, Rohit [1 ]
Mohanty, Sraban Kumar [1 ]
机构
[1] Indian Inst Informat Technol Design & Mfg, Dept CSE, Jabalpur 482005, MP, India
关键词
Cloud computing; Access control; Encryption; Scalability; Servers; delegation; access privileges; data security; attribute-based encryption; ENCRYPTION; REVOCATION; SECURITY;
D O I
10.1109/TCC.2017.2751471
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays cloud servers have become the primary choice to store and share data with multiple users across the globe. The major challenge in sharing data using cloud servers is to protect data against untrusted cloud service provider and illegitimate users. Attribute-Based Encryption (ABE) has emerged as a useful cryptographic technique to securely share data with legitimate recipients in fine-grained manner. Several solutions employing ABE have been proposed to securely share data using cloud servers. However, most of the solutions are data owner-centric and focus on providing data owner complete control on his outsourced data. The existing solutions in cloud computing fail to provide shared access privileges among users and to enable cloud users to delegate their access privileges in a flexible manner. In order to simultaneously achieve the notion of fine-grained access control, scalability and to provide cloud users shared access privileges and flexibility on delegation of their access privileges, we propose a scalable attribute-based access control scheme for cloud storage. The scheme extends the ciphertext policy attribute-based encryption to achieve flexible delegation of access privileges and shared access privileges along with scalability and fine-grained access control. The scheme achieves scalability by employing hierarchical structure of users. Furthermore, we formally prove the security of our proposed scheme based on security of the ciphertext-policy attribute-based encryption. We also implement the algorithm to show its scalability and efficiency.
引用
收藏
页码:32 / 44
页数:13
相关论文
共 33 条
  • [1] A Traceable Signcryption Scheme for Secure Sharing of Data in Cloud Storage
    Ahuja, Rohit
    Mohanty, Sraban Kumar
    Sakurai, Kouichi
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2016, : 524 - 531
  • [2] A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing
    Ahuja, Rohit
    Mohanty, Sraban Kumar
    Sakurai, Kouichi
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 57 : 241 - 256
  • [3] An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing
    Ahuja, Rohit
    Mohanty, Sraban Kumar
    Sakurai, Kouichi
    [J]. 2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2016, : 39 - 47
  • [4] [Anonymous], [No title captured]
  • [5] [Anonymous], [No title captured]
  • [6] [Anonymous], [No title captured]
  • [7] [Anonymous], MANAGING LEADING SCI
  • [8] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [9] Bobba R, 2009, LECT NOTES COMPUT SC, V5789, P587, DOI 10.1007/978-3-642-04444-1_36
  • [10] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615