Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

被引:232
作者
Li, Jiguo [1 ]
Yao, Wei [1 ]
Zhang, Yichen [1 ]
Qian, Huiling [1 ]
Han, Jinguang [2 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Jiangsu, Peoples R China
[2] Nanjing Univ Finance & Econ, Jiangsu Prov Key Lab E Business, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; attribute-based encryption; outsource decryption; user revocation; collusion attack; ENCRYPTION; RETRIEVAL; SECURE;
D O I
10.1109/TSC.2016.2520932
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing, outsourcing data to cloud server attracts lots of attentions. To guarantee the security and achieve flexibly fine-grained file access control, attribute based encryption (ABE) was proposed and used in cloud storage system. However, user revocation is the primary issue in ABE schemes. In this article, we provide a ciphertext-policy attribute based encryption (CP-ABE) scheme with efficient user revocation for cloud storage system. The issue of user revocation can be solved efficiently by introducing the concept of user group. When any user leaves, the group manager will update users' private keys except for those who have been revoked. Additionally, CP-ABE scheme has heavy computation cost, as it grows linearly with the complexity for the access structure. To reduce the computation cost, we outsource high computation load to cloud service providers without leaking file content and secret keys. Notably, our scheme can withstand collusion attack performed by revoked users cooperating with existing users. We prove the security of our scheme under the divisible computation Diffie-Hellman assumption. The result of our experiment shows computation cost for local devices is relatively low and can be constant. Our scheme is suitable for resource constrained devices.
引用
收藏
页码:785 / 796
页数:12
相关论文
共 34 条
[1]  
[Anonymous], PROC 4 THEOR CRYPT
[2]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[3]  
Bao F, 2003, LECT NOTES COMPUT SC, V2836, P301
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[6]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[7]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Caro A., 2013, Java pairing-based cryptography library
[10]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456