RWAC: A Self-contained Read and Write Access Control Scheme for Group Collaboration

被引:0
作者
Wang, Jinmiao [1 ]
Lang, Bo [1 ]
Zhu, Ruijin [2 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing, Peoples R China
[2] China Informat Technol Secur Evaluat Ctr, Beijing, Peoples R China
来源
2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC) | 2018年
基金
中国国家自然科学基金;
关键词
group collaboration; read control; write control; attribute-based encryption; attribute-based group signature;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the development of the Internet and personal digital devices, self-organizing and open-pattern collaborations are becoming popular. In such environments, data are usually outsourced to third-party servers in the cloud, which are out of the control domain of data owners. Hence, traditional access control models, which are enforced relying on data storage servers, will face new security challenges. In this paper, we propose a self-contained read and write access control (RWAC) scheme based on ciphertext-policy attribute-based encryption (CP-ABE) and attribute-based group signature (ABGS) mechanism. By adopting a two-step encryption strategy using CP-ABE and utilizing the write control policy as the signature policy in ABGS, RWAC ensures that fine-grained read and write access control can be enforced during decryption and signature generation without dependence on any third parties. To prevent privacy leakage from RWAC policies, we adopt a CP-ABE scheme with hidden policy. Then, we introduce the policy hiding method into ABGS and propose an ABGS scheme with hidden policy. Moreover, users can trace the edit history of each data object with the signature or a write list. The security analysis indicates that RWAC is able to enforce fine-grained read and write access controls for group collaborations while also ensuring data confidentiality and integrity.
引用
收藏
页码:97 / 103
页数:7
相关论文
共 15 条
[1]   LotusNet: Tunable privacy for distributed online social network services [J].
Aiello, Luca Maria ;
Ruffo, Giancarlo .
COMPUTER COMMUNICATIONS, 2012, 35 (01) :75-88
[2]  
[Anonymous], 2008, P 1 WORKSH ONL SOC N
[3]  
Baden R, 2009, SIGCOMM 2009, P135
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Buchegger Sonja., 2009, P 2 AC M EUROSYS WOR, P46, DOI DOI 10.1145/1578002.1578010
[6]  
Cutillo LA, 2009, WONS 2009: SIXTH INTERNATIONAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES, P133
[7]  
Graffi Kalman, 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC 2011), P554, DOI 10.1109/CCNC.2011.5766541
[8]  
Jahid S., 2011, IEEE INT C PERV COMP, P326
[9]  
Jang-Jaccard Julian, 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2013), P553, DOI 10.4108/icst.collaboratecom.2013.254212
[10]  
Jinmiao W., 2017, 13 INT C COLL COMP N