Secure, efficient and revocable multi-authority access control system in cloud storage

被引:91
作者
Li, Qi [1 ]
Ma, Jianfeng [2 ]
Li, Rui [3 ,4 ]
Liu, Ximeng [2 ]
Xiong, Jinbo [5 ]
Chen, Danwei [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Nanjing 210023, Jiangsu, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[3] Xidian Univ, Sch Software, Xian 710071, Peoples R China
[4] Xidian Univ, Inst Software Engn, Xian 710071, Peoples R China
[5] Fujian Normal Univ, Fac Software, Fuzhou 350108, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; Access control; Multi-authority; Decryption outsourcing; Adaptively secure; Attribute-level revocation; ATTRIBUTE-BASED ENCRYPTION;
D O I
10.1016/j.cose.2016.02.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-Authority Attribute-Based Encryption (MA-ABE) is an emerging cryptographic primitive for enforcing fine-grained attribute-based access control on the outsourced data in cloud storage. However, most of the previous multi-authority attribute-based systems are either proven to be secure in a weak model or lack of efficiency in user revocation. In this paper, we propose MAACS (Multi-Authority Access Control System), a novel multi-authority attribute based data access control system for cloud storage. We construct a new multi-authority ciphertext-policy ABE (MA-CP-ABE) scheme with decryption outsourcing.The decryption overhead for users is largely eliminated by outsourcing the undesirable bilinear pairing operations to the cloud servers. The proposed MA-CP-ABE scheme is proven adaptively secure in the standard model and supports any monotone access policy. We also design an efficient attribute-level user revocation approach with less computation cost. The security analysis, numerical comparisons and implementation results indicate that our MAACS is secure, efficient and scalable. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:45 / 59
页数:15
相关论文
共 34 条
  • [1] [Anonymous], 1996, SECURE SCHEMES SECRE
  • [2] [Anonymous], CCS07 P 14 ACM C
  • [3] [Anonymous], 2011, PROCEEDING SEC 11 P
  • [4] Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
  • [5] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [6] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [7] Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
  • [8] Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
  • [9] Canetti R, 2003, LECT NOTES COMPUT SC, V2656, P255
  • [10] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515