FINE-GRAINED ACCESS CONTROL SYSTEMS SUITABLE FOR RESOURCE-CONSTRAINED USERS IN CLOUD COMPUTING

被引:9
作者
Zhang, Yinghui [1 ,2 ]
Zheng, Dong [1 ,2 ]
Guo, Rui [1 ]
Zhao, Qinglan [1 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Attribute-based encryption; constant computation; access control; re-vocation; cloud computing; ATTRIBUTE-BASED ENCRYPTION; PRIVACY PROTECTION; BROADCAST; EFFICIENT;
D O I
10.4149/cai_2018_2_327
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
For the sake of practicability of cloud computing, fine-grained data access is frequently required in the sense that users with different attributes should be granted different levels of access privileges. However, most of existing access control solutions are not suitable for resource-constrained users because of large computation costs, which linearly increase with the complexity of access policies. In this paper, we present an access control system based on ciphertext-policy attribute-based encryption. The proposed access control system enjoys constant computation cost and is proven secure in the random oracle model under the decision Bilinear Diffie-Hellman Exponent assumption. Our access control system supports AND-gate access policies with multiple values and wildcards, and it can efficiently support direct user revocation. Performance comparisons indicate that the proposed solution is suitable for resource-constrained environment.
引用
收藏
页码:327 / 348
页数:22
相关论文
共 37 条
[1]  
[Anonymous], 1993, CRYPTO, DOI DOI 10.1007/3-540-48329-2
[2]  
[Anonymous], STANFORD PAIRING BAS
[3]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[6]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[7]  
Chen C, 2011, LECT NOTES COMPUT SC, V6980, P84, DOI 10.1007/978-3-642-24316-5_8
[8]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[9]  
Emura K, 2009, LECT NOTES COMPUT SC, V5451, P13, DOI 10.1007/978-3-642-00843-6_2
[10]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1