Revocable, Decentralized Multi-authority Access Control System

被引:2
|
作者
Al-Dahhan, Ruqayah R. [1 ,2 ]
Shi, Qi [2 ]
Lee, Gyu Myoung [2 ]
Kifayat, Kashif [2 ]
机构
[1] Univ Anbar, Coll Comp & Informat Technol, Ramadi, Iraq
[2] Liverpool John Moores Univ, Dept Comp Sci, Byrom St, Liverpool, Merseyside, England
来源
2018 IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING COMPANION (UCC COMPANION) | 2018年
关键词
Multi-authority; Access control; Cloud storage; Revocation; Cipher-text Policy Attribute Based Encryption; IMPROVING PRIVACY; SECURITY;
D O I
10.1109/UCC-Companion.2018.00088
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For secure, public cloud storage, an access control scheme is critical, which ought to be carefully designed to achieve fine-grained access control and support outsourced-data confidentiality. Cipher-text Policy Attribute Based Encryption (CP-ABE) is introduced as one of the most beneficial, powerful techniques that can be leveraged to construct a secure access control system. However, this type of technique mainly supports storing data only on a private cloud storage system in which the service is managed by only one single authority. In addition, CP-ABE does not properly consider revocation issues to address changes to policy attributes and users. These two issues have motivated many researchers to develop more suitable schemes with limited success. By leveraging the existing work, in this paper, we propose a new CP-ABE scheme that tackles most of the existing work's limitations and securely allows storing data on a public cloud storage system by employing multiple authorities which manage a joint set of attributes. Furthermore, the proposed scheme efficiently addresses the revocation issue by presenting two techniques that allow policy update and invalidate a user's secret key to eliminate collusion attacks. In terms of computation overhead, the proposed system outsources expensive operations of encryption and decryption to a cloud server to mitigate the burden on a data owner and data users, respectively. Our security and performance analysis of the system demonstrates that our system is practical and secure.
引用
收藏
页码:220 / 225
页数:6
相关论文
共 50 条
  • [1] Revocable Decentralized Multi-Authority Functional Encryption
    Tsuchida, Hikaru
    Nishide, Takashi
    Okamoto, Eiji
    Kim, Kwangjo
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 248 - 265
  • [2] Secure, efficient and revocable multi-authority access control system in cloud storage
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Liu, Ximeng
    Xiong, Jinbo
    Chen, Danwei
    COMPUTERS & SECURITY, 2016, 59 : 45 - 59
  • [3] A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth
    Zhang, Leyou
    Zhao, Chuchu
    Wu, Qing
    Mu, Yi
    Rezaeibagha, Fatemeh
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 130
  • [4] Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
    Yang, Kan
    Jia, Xiaohua
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (07) : 1735 - 1744
  • [5] Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN
    Wu, Zhijun
    Zhang, Yun
    Xu, Enzhong
    FUTURE INTERNET, 2020, 12 (01):
  • [6] A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse
    Zhang, Shaobo
    Wang, Yuechao
    Luo, Entao
    Liu, Qin
    Gu, Ke
    Wang, Guojun
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 140
  • [7] Attribute-Based Data Access Control for Multi-Authority System
    Salehi, Ahmad S.
    Rudolph, Carsten
    Grobler, Marthie
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1834 - 1841
  • [8] A robust and secure multi-authority access control system for cloud storage
    Jin Gu
    Jianqiang Shen
    Baoyun Wang
    Peer-to-Peer Networking and Applications, 2021, 14 : 1488 - 1499
  • [9] A robust and secure multi-authority access control system for cloud storage
    Gu, Jin
    Shen, Jianqiang
    Wang, Baoyun
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1488 - 1499
  • [10] ERACMA: Expressive and Revocable Access Control With Multi-Authority for AIoT-Enabled Human Centric Consumer Electronics
    Zhuang, Yue
    Wang, Chen
    Zheng, Wenying
    Victor, Nancy
    Gadekallu, Thippa Reddy
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 1102 - 1111