Hierarchical Access Control with Scalable Data Sharing in Cloud Storage

被引:4
作者
Qiu, Zhenyao [1 ]
Zhang, Zhiwei [1 ]
Tan, Shichong [1 ]
Wang, Jianfeng [1 ]
Tao, Xiaoling [2 ,3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Shaanxi, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Cooperat Innovat Ctr Cloud Comp & Big Dat, Guilin, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Coll & Univ Key Lab Cloud Comp & Complex, Guilin, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2019年 / 20卷 / 03期
基金
中国国家自然科学基金;
关键词
Access control; Hierarchical key assignment; Data sharing; Cloud storage; Key-aggregate encryption; ATTRIBUTE-BASED ENCRYPTION; OUTSOURCED DATABASE; SECURE; SEARCH;
D O I
10.3966/160792642019052003002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage is facing the contradiction between data security and flexible data sharing, and therefore the cryptographic access control mechanisms are well studied. In particular, hierarchical access control in cloud storage is significant for many application scenarios. In these scenarios, the users are divided into several groups organized in a hierarchy, and they are assigned with different access privileges according to their groups and levels. That is, the users in higher level groups can access the data belonging to their subordinate groups while the users in lower level groups cannot access the data belonging to their superior groups. However, most of the existing hierarchical access control solutions seem to be unpractical for their inability of scalable data sharing, inefficiency of key management or lack of delegated reencryption. In this paper, we propose a new hierarchical access control scheme based on key-aggregate encryption, and the proposed scheme realizes scalable data sharing in cloud storage which allows the users to share data with any user group. In the proposed scheme, the size of each key or ciphertext is constant and irrelevant to the scale of hierarchical user structure. Especially, our scheme improves the convenience of key management by cutting off the key derivation widely used in the existing hierarchical key assignment methods. Furthermore, the proposed scheme reduces the users' updating overhead by introducing the delegated re-encryption into the hierarchical scenarios. Finally, the security analysis and the performance evaluation indicate that our scheme is feasible for the hierarchical data sharing applications in cloud storage.
引用
收藏
页码:663 / 676
页数:14
相关论文
共 44 条
  • [1] CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
    AKL, SG
    TAYLOR, PD
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03): : 239 - 248
  • [2] [Anonymous], J INTERNET TECHNOLOG
  • [3] [Anonymous], FUTURE GENERATION CO
  • [4] [Anonymous], J AMBIENT INTELLIGEN
  • [5] [Anonymous], INFORM SCI
  • [6] [Anonymous], 2017, IEEE T DEPENDABLE SE
  • [7] [Anonymous], 2013, P INT C APPL CRYPT N
  • [8] [Anonymous], EUR S RES COMP SEC O
  • [9] Dynamic and Efficient Key Management for Access Hierarchies
    Atallah, Mikhail J.
    Blanton, Marina
    Fazio, Nelly
    Frikken, Keith B.
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (03)
  • [10] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +