CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage

被引:56
作者
Ning, Jianting [1 ]
Cao, Zhenfu [2 ]
Dong, Xiaolei [2 ]
Liang, Kaitai [3 ]
Wei, Lifei [4 ]
Choo, Kim-Kwang Raymond [5 ]
机构
[1] Natl Univ Singapore, Dept Comp Sci, Singapore 119077, Singapore
[2] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[3] Univ Surrey, Dept Comp Sci, Guildford GU2 7XH, Surrey, England
[4] Shanghai Ocean Univ, Sch Informat Technol, Shanghai 201306, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
新加坡国家研究基金会; 英国工程与自然科学研究理事会; 中国国家自然科学基金;
关键词
Secure cloud storage; ciphertext-policy attribute-based encryption; access credentials misuse; traceability and revocation; auditing; ATTRIBUTE-BASED ENCRYPTION; EFFICIENT; PRIVACY;
D O I
10.1109/TSC.2018.2791538
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure cloud storage, which is an emerging cloud service, is designed to protect the confidentiality of outsourced data but also to provide flexible data access for cloud users whose data is out of physical control. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is regarded as one of the most promising techniques that may be leveraged to secure the guarantee of the service. However, the use of CP-ABE may yield an inevitable security breach which is known as the misuse of access credential (i.e., decryption rights), due to the intrinsic "all-or-nothing" decryption feature of CP-ABE. In this paper, we investigate the two main cases of access credential misuse: one is on the semi-trusted authority side, and the other is on the side of cloud user. To mitigate the misuse, we propose the first accountable authority and revocable CP-ABE based cloud storage system with white-box traceability and auditing, referred to as CryptCloud(+). We also present the security analysis and further demonstrate the utility of our system via experiments.
引用
收藏
页码:111 / 124
页数:14
相关论文
共 56 条
  • [1] SeDaSC: Secure Data Sharing in Clouds
    Ali, Mazhar
    Dhamotharan, Revathi
    Khan, Eraj
    Khan, Samee U.
    Vasilakos, Athanasios V.
    Li, Keqin
    Zomaya, Albert Y.
    [J]. IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 395 - 404
  • [2] Security in cloud computing: Opportunities and challenges
    Ali, Mazhar
    Khan, Samee U.
    Vasilakos, Athanasios V.
    [J]. INFORMATION SCIENCES, 2015, 305 : 357 - 383
  • [3] A View of Cloud Computing
    Armbrust, Michael
    Fox, Armando
    Griffith, Rean
    Joseph, Anthony D.
    Katz, Randy
    Konwinski, Andy
    Lee, Gunho
    Patterson, David
    Rabkin, Ariel
    Stoica, Ion
    Zaharia, Matei
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (04) : 50 - 58
  • [4] Attrapadung N, 2009, LECT NOTES COMPUT SC, V5921, P278, DOI 10.1007/978-3-642-10868-6_17
  • [5] Beimel A., 1996, Secure schemes for secret sharing and key distribution
  • [6] Bellare O., 1992, LNCS, V740, P390, DOI DOI 10.1007/3-540-48071-428
  • [7] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
  • [8] IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges
    Cai, Hongming
    Xu, Boyi
    Jiang, Lihong
    Vasilakos, Athanasios V.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (01): : 75 - 87
  • [9] Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
    Chen, Jie
    Gay, Romain
    Wee, Hoeteck
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 595 - 624
  • [10] De Caro A, 2011, IEEE SYMP COMP COMMU