An Extended CP-ABE based Access Control Model for Data Outsourced in the Cloud

被引:22
作者
Fugkeaw, Somchart [1 ]
Sato, Hiroyuki [1 ]
机构
[1] Univ Tokyo, Dept Elect Engn & Informat Syst, Tokyo 1138654, Japan
来源
IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3 | 2015年
关键词
acceess control; privacy; collaborative cloud; key management; user revocation; attribute-based encryption;
D O I
10.1109/COMPSAC.2015.216
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper proposes an access control scheme called Collaborative Ciphertext-Policy Attribute Role Based Encryption (C-CP-ARBE). Our C-CP-ARBE integrates Role-based Access Control (RBAC) into a Ciphertext-Policy Attribute-based Encryption (CP-ABE). The proposed model provides high expressiveness of access control policy, scalable user management, and less user revocation cost compared to the existing approach. In addition, our model supports both read and write access control in a more complex data sharing in collaborative cloud storage where there are multi-owner, multi-user, and multi-authority. For the evaluation, we develop the access control tool and set up test cases to validate the functionality of our proposed scheme. We also conduct the performance evaluation and compare the revocation cost of our C-CP-ARBE and CP-ABE scheme to demonstrate that our revocation method incurs less computation cost and efficient in practice for supporting a larger scale of users.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 50 条
  • [31] Efficient Outsourced Data Access Control with User Revocation for Cloud-based IoT
    Hao, Jialu
    Huang, Cheng
    Liu, Jian
    Xian, Ming
    Shen, Xuemin
    [J]. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [32] Data Sharing in the Metaverse With Key Abuse Resistance Based on Decentralized CP-ABE
    Zhang, Liang
    Ou, Zhanrong
    Hu, Changhui
    Kan, Haibin
    Zhang, Jiheng
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2025, 74 (03) : 901 - 914
  • [33] CP-ABE with Efficient Revocation Based on the KEK Tree in data Outsourcing System
    Wang, Xi-kun
    Sun, Xin
    [J]. 2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 8610 - 8615
  • [34] Improving Privacy-Preserving CP-ABE with Hidden Access Policy
    Zhang, Leyou
    Cui, Yilei
    Mu, Yi
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 596 - 605
  • [35] Efficient and Secure Data Storage CP-ABE Analysis Algorithm
    SenthurSelvi, V
    Gomathi, S.
    Selvi, V. Perathu
    Nisha, M. Sharon
    [J]. INTELLIGENT COMMUNICATION TECHNOLOGIES AND VIRTUAL MOBILE NETWORKS, ICICV 2019, 2020, 33 : 470 - 476
  • [36] Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption
    De, Sourya Joyee
    Ruj, Sushmita
    [J]. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [37] Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT
    Zhang, Zhishuo
    Zhang, Wei
    Qin, Zhiguang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [38] PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system
    Zhang, Wei
    Zhang, Zhishuo
    Xiong, Hu
    Qin, Zhiguang
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 613 - 627
  • [39] A Traitor Tracing and Access Control Method for Encrypted 3D Models Based on CP-ABE and Fair Watermark
    Hou, Gangyang
    Ou, Bo
    Peng, Fei
    Long, Min
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2025, 32 : 696 - 700
  • [40] Multi-Authority-Based File Hierarchy Hidden CP-ABE Scheme for Cloud Security
    G. K. Sandhia
    S. V. Kasmir Raja
    K. R. Jansi
    [J]. Service Oriented Computing and Applications, 2018, 12 (3-4) : 295 - 303