NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems

被引:3
作者
Xu Xiao-long [1 ,2 ]
Zhang Qi-tong [1 ]
Zhou Jing-lan [2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210046, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud storage; data privacy; proxy re-encryption; multi-authority; ATTRIBUTE-BASED ENCRYPTION;
D O I
10.1007/s11771-017-3483-z
中图分类号
TF [冶金工业];
学科分类号
0806 ;
摘要
The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption (NC-MACPABE). NC-MACPABE optimizes the weighted access structure (WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users' information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user's access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time.
引用
收藏
页码:807 / 818
页数:12
相关论文
共 28 条
[11]  
Feng Deng-Guo, 2011, Journal of Software, V22, P71, DOI 10.3724/SP.J.1001.2011.03958
[12]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[13]  
Huang Ru-Wei, 2011, Chinese Journal of Computers, V34, P2391, DOI 10.3724/SP.J.1016.2011.02391
[14]   Secure threshold multi authority attribute based encryption without a central authority [J].
Lin, Huang ;
Cao, Zhenfu ;
Liang, Xiaohui ;
Shao, Jun .
INFORMATION SCIENCES, 2010, 180 (13) :2618-2632
[15]   Depot: Cloud Storage with Minimal Trust [J].
Mahajan, Prince ;
Setty, Srinath ;
Lee, Sangmin ;
Clement, Allen ;
Alvisi, Lorenzo ;
Dahlin, Mike ;
Walfish, Michael .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2011, 29 (04)
[16]  
Mao Jian, 2011, Journal of Tsinghua University (Science and Technology), V51, P1357
[17]  
RISHI I., 2014, APPLE STRENGTHEN SEC
[18]   Fuzzy identity-based encryption [J].
Sahai, A ;
Waters, B .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :457-473
[19]  
Shamir A., 1984, ADV CRYPTOLOGY, P47, DOI 10.1007/3-540-39568-7_5
[20]  
Shraer A, 2010, PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:), P18