Temporal Access Control with User Revocation for Cloud Data

被引:9
作者
Balani, Nihal [1 ]
Ruj, Sushmita [2 ]
机构
[1] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
[2] Indian Stat Inst, RC Bose Ctr Cryptol & Secur, Kolkata, India
来源
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM) | 2014年
关键词
Access Control; Cloud Storage; CP-ABE; Temporal Access Control; Revocation;
D O I
10.1109/TrustCom.2014.45
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a temporal access control scheme to protect and selectively access data in clouds. In many applications like healthcare, online tests, social networks, data should be accessed within a certain period of time. Although access control has been widely studied, temporal access control has not received attention. Ours is the first scheme on temporal access control with user revocation. Our scheme encrypts and stores data in clouds in such a way that only authorized users are able to decrypt it within a specified time period. We use a new variant of attribute-based encryption in order to achieve our objective. To reduce computational load during decryption, we partially outsource the decryption to a proxy server, who can gain no information about the data. We analytically show that our scheme has comparable computation and communication costs, but also supports revocation, which was not present in previous schemes.
引用
收藏
页码:336 / 342
页数:7
相关论文
共 19 条
[1]  
[Anonymous], 2012, IACR CRYPTOL EPRINT
[2]  
[Anonymous], 2012, PROC ACM C DATA APPL
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[7]  
Green M., 2011, P 20 USENIX SEC S US
[8]  
Jahid Sonia., 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, P411
[9]  
Li M, 2010, L N INST COMP SCI SO, V50, P89
[10]  
Naor M, 2001, LECT NOTES COMPUT SC, V1962, P1