A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing

被引:12
作者
Ahuja, Rohit [1 ]
Mohanty, Sraban Kumar [1 ]
Sakurai, Kouichi [2 ]
机构
[1] PDPM Indian Inst Informat Technol Design & Mfg, Dept Comp Sci & Engn, Jabalpur, India
[2] Kyushu Univ, Dept Informat, Fukuoka 812, Japan
关键词
Privacy-preserving; security; Full-fledged delegation; Cloud computing; Shared access privileges; Cloud storage security; ENCRYPTION; SECURE;
D O I
10.1016/j.compeleceng.2016.11.028
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The benefits of cloud computing motivate enterprises to migrate their IT infrastructure on cloud servers. Enterprise needs to entrust untrusted cloud service provider, which gives rise to various security and privacy concerns. To address these concerns, numerous schemes in cloud computing employed attribute-based encryption schemes. However, existing schemes are neither flexible enough to provide users complete liberty on delegation of their access privileges nor grant shared access privileges among users of a group to jointly address a responsibility. This paper introduces hierarchical attribute-set-based access control scheme by employing ciphertext-policy attribute-set-based encryption with a hierarchical structure of users to achieve scalability. The proposed scheme simultaneously achieves the notion of fine-grained cum flexible access control, privacy preserving, efficient data utilization and imperatively provides users full-fledged liberty on delegation of their access privileges. Furthermore, we formally prove that proposed scheme is secure under decisional bilinear Diffie-Hellman assumption. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:241 / 256
页数:16
相关论文
共 23 条
  • [1] [Anonymous], THESIS
  • [2] [Anonymous], MANAGING LEADING SCI
  • [3] [Anonymous], IDENTITY BASED ENCRY
  • [4] [Anonymous], 11 AS JOINT C INF SE
  • [5] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [6] Bobba R, 2009, LECT NOTES COMPUT SC, V5789, P587, DOI 10.1007/978-3-642-04444-1_36
  • [7] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [8] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
  • [9] Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
  • [10] Buyya R, 2010, CLOUD COMPUTING PRIN