A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing

被引:9
作者
Fugkeaw, Somchart [1 ]
机构
[1] Thammasat Univ, Sirindhorn Int Inst Technol, Bangkok 12000, Thailand
关键词
Cryptography; Access control; Encryption; Cloud computing; Mobile handsets; Servers; Task analysis; CP-ABE; role-based; mobile cloud; proxy re-encryption; write privilege;
D O I
10.1109/ACCESS.2020.3046869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With rapidly increasing adoption of cloud computing and the advancement of today mobile computing, it is inevitable that mobile devices are used to receive and send the data through the mobile cloud platform. This increases the convenience and flexibility of data access over the cloud computing since data users are able to access the shared data anytime, anywhere via mobile devices. However, using mobile devices in accessing shared data in a cloud where the sensitive data is encrypted is not practical because mobile devices have limited computing resources in dealing with heavy cryptographic operations. In this article, we propose a lightweight collaborative ciphertext policy attribute role-based encryption (LW-C-CP-ARBE) scheme to support a fine-grained and lightweight access control for mobile cloud environment. We apply CP-ABE approach as a core cryptographic access control and introduce a new proxy re-encryption (PRE) protocol to reduce data re-encryption and decryption cost for the mobile users. To this end, the overhead in running the cryptographic operation at the end-user device is small. In addition, we develop secure access policy sharing and re-encryption protocol to enable users having write privilege to update the data and request the proxy to perform data re-encryption. Finally, we present the evaluation and experiments to demonstrate the efficiency and practicality of our system.
引用
收藏
页码:836 / 848
页数:13
相关论文
共 30 条
  • [1] SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT
    Aghili, Seyed Farhad
    Mala, Hamid
    Kaliyar, Pallavi
    Conti, Mauro
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 621 - 634
  • [2] LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT
    Aghili, Seyed Farhad
    Mala, Hamid
    Shojafar, Mohammad
    Peris-Lopez, Pedro
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 410 - 424
  • [3] [Anonymous], PBC (Pairing-Based Cryptography) Library.
  • [4] Barbhuiya F.A., 2020, ROLE BASED ENCRYPTIO
  • [5] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [6] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    [J]. IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [7] Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
  • [8] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
  • [9] Fugkeaw Somchart, 2016, International Journal of High Performance Computing and Networking, V9, P299
  • [10] Enforcing Hidden Access Policy for Supporting Write Access in Cloud Storage Systems
    Fugkeaw, Somchart
    Sato, Hiroyuki
    [J]. CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 530 - 536