An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage

被引:77
作者
Xue, Yingjie [1 ]
Xue, Kaiping [1 ]
Gai, Na [1 ]
Hong, Jianan [1 ]
Wei, David S. L. [2 ]
Hong, Peilin [1 ]
机构
[1] Univ Sci & Technol China, Dept Elect Engn & Informat Sci, Hefei 230027, Anhui, Peoples R China
[2] Fordham Univ, Comp & Informat Sci Dept, New York, NY 10458 USA
基金
中国国家自然科学基金;
关键词
Public cloud storage; access control; CP-ABE; collaboration; ENCRYPTION;
D O I
10.1109/TIFS.2019.2911166
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In public cloud storage services, data are outsourced to semi-trusted cloud servers which are outside of data owners' trusted domain. To prevent untrustworthy service providers from accessing data owners' sensitive data, outsourced data are often encrypted. In this scenario, conducting access control over these data becomes a challenging issue. Attribute-based encryption (ABE) has been proved to be a powerful cryptographic tool to express access policies over attributes, which can provide a fine-grained, flexible, and secure access control over outsourced data. However, the existing ABE-based access control schemes do not support users to gain access permission by collaboration. In this paper, we explore a special attribute-based access control scenario where multiple users having different attribute sets can collaborate to gain access permission if the data owner allows their collaboration in the access policy. Meanwhile, the collaboration that is not designated in the access policy should be regarded as a collusion and the access request will be denied. We propose an attribute-based controlled collaborative access control scheme through designating translation nodes in the access structure. Security analysis shows that our proposed scheme can guarantee data confidentiality and has many other critical security properties. Extensive performance analysis shows that our proposed scheme is efficient in terms of storage and computation overhead.
引用
收藏
页码:2927 / 2942
页数:16
相关论文
共 35 条
[1]  
[Anonymous], 1997, Proceedings of the Second ACM Workshop on Role-based Access Control. ACM, New York, NY, USA
[2]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[5]  
Bobba R, 2009, LECT NOTES COMPUT SC, V5789, P587, DOI 10.1007/978-3-642-04444-1_36
[6]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[7]  
Carminati B, 2008, LECT NOTES COMPUT SC, V5094, P81
[8]   Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage [J].
Du, Minxin ;
Wang, Qian ;
He, Meiqi ;
Weng, Jian .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2320-2332
[9]  
Goh E.jin., 2003, PROC NETWORK DISTRIB, P131
[10]  
Green Matthew., 2011, USENIX SECURITY S, V2011