NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems

被引:3
作者
Xu Xiao-long [1 ,2 ]
Zhang Qi-tong [1 ]
Zhou Jing-lan [2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210046, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud storage; data privacy; proxy re-encryption; multi-authority; ATTRIBUTE-BASED ENCRYPTION;
D O I
10.1007/s11771-017-3483-z
中图分类号
TF [冶金工业];
学科分类号
0806 ;
摘要
The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption (NC-MACPABE). NC-MACPABE optimizes the weighted access structure (WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users' information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user's access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time.
引用
收藏
页码:807 / 818
页数:12
相关论文
共 28 条
[1]  
[Anonymous], 2010, NSDI
[2]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]   Multi-authority attribute-based encryption with honest-but-curious central authority [J].
Bozovic, Vladimir ;
Socek, Daniel ;
Steinwandt, Rainer ;
Villanyi, Viktoria I. .
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89 (03) :268-283
[7]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[8]  
Cloud Security Alliance, 2013, SEC GUID CRIT AR FOC
[9]  
DAMIANI E, 2011, INT J ADV SECURITY, V4, P185
[10]  
Fei Hu, 2011, Journal of Computing and Information Technology - CIT, V19, P25, DOI 10.2498/cit.1001864