Revocable, Decentralized Multi-authority Access Control System

被引:2
作者
Al-Dahhan, Ruqayah R. [1 ,2 ]
Shi, Qi [2 ]
Lee, Gyu Myoung [2 ]
Kifayat, Kashif [2 ]
机构
[1] Univ Anbar, Coll Comp & Informat Technol, Ramadi, Iraq
[2] Liverpool John Moores Univ, Dept Comp Sci, Byrom St, Liverpool, Merseyside, England
来源
2018 IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING COMPANION (UCC COMPANION) | 2018年
关键词
Multi-authority; Access control; Cloud storage; Revocation; Cipher-text Policy Attribute Based Encryption; IMPROVING PRIVACY; SECURITY;
D O I
10.1109/UCC-Companion.2018.00088
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For secure, public cloud storage, an access control scheme is critical, which ought to be carefully designed to achieve fine-grained access control and support outsourced-data confidentiality. Cipher-text Policy Attribute Based Encryption (CP-ABE) is introduced as one of the most beneficial, powerful techniques that can be leveraged to construct a secure access control system. However, this type of technique mainly supports storing data only on a private cloud storage system in which the service is managed by only one single authority. In addition, CP-ABE does not properly consider revocation issues to address changes to policy attributes and users. These two issues have motivated many researchers to develop more suitable schemes with limited success. By leveraging the existing work, in this paper, we propose a new CP-ABE scheme that tackles most of the existing work's limitations and securely allows storing data on a public cloud storage system by employing multiple authorities which manage a joint set of attributes. Furthermore, the proposed scheme efficiently addresses the revocation issue by presenting two techniques that allow policy update and invalidate a user's secret key to eliminate collusion attacks. In terms of computation overhead, the proposed system outsources expensive operations of encryption and decryption to a cloud server to mitigate the burden on a data owner and data users, respectively. Our security and performance analysis of the system demonstrates that our system is practical and secure.
引用
收藏
页码:220 / 225
页数:6
相关论文
共 50 条
[31]   Revocation Basis and Proofs Access Control for Cloud Storage Multi-Authority Systems [J].
Riad, Khaled .
2016 THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND PATTERN RECOGNITION (AIPR), 2016,
[32]   Image Stack Management and Data Access Control for Multi-Authority Cloud Storage [J].
Dhargave, Shrutika C. ;
Karande, Shridevi C. .
2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,
[33]   Research on Multi-Authority CP-ABE Access Control Model in Multicloud [J].
Zhou, Shengli ;
Chen, Guangxuan ;
Huang, Guangjie ;
Shi, Jin ;
Kong, Ting .
CHINA COMMUNICATIONS, 2020, 17 (08) :220-233
[34]   Traceable and revocable multi-authority attribute-based keyword search for cloud storage [J].
Varri, Uma Sankararao ;
Pasupuleti, Syam Kumar ;
Kadambari, K., V .
JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 132
[35]   Revocable Outsourcing Multi-Authority ABE for Medical Data in Mobile Cloud [J].
Koe, Arthur Sandor Voundi ;
Tang, Juan ;
Ai, Shan ;
Yan, Hongyang ;
Zhang, Shiwen .
IEEE CONGRESS ON CYBERMATICS / 2021 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS (ITHINGS) / IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) / IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) / IEEE SMART DATA (SMARTDATA), 2021, :338-345
[36]   A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing [J].
Tu, Shanshan ;
Waqas, Muhammad ;
Huang, Fengming ;
Abbas, Ghulam ;
Abbas, Ziaul Haq .
COMPUTER NETWORKS, 2021, 195
[37]   Multi-Authority Attribute-Based Encryption Access Control Scheme in Wireless Body Area Network [J].
Xiao, Min ;
Hu, Xiaoyong .
2018 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS ENGINEERING (ICISE), 2018, :39-45
[38]   Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption [J].
Li, Yang ;
Qi, Baoyue ;
Wang, Mengmeng ;
Zhu, Jianming ;
Wang, Xiuli .
DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 :105-124
[39]   Multi-authority fine-grained access control with accountability and its application in cloud [J].
Li, Jin ;
Chen, Xiaofeng ;
Chow, Sherman S. M. ;
Huang, Qiong ;
Wong, Duncan S. ;
Liu, Zheli .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 112 :89-96
[40]   Blockchain-based and multi-authority hierarchical access control data sharing scheme [J].
Du, Jianming ;
Dong, Guofang ;
Ning, Juangui ;
Xu, Zhengnan ;
Yang, Ruicheng .
COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119