Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage

被引:15
作者
Challagidad, Praveen S. [1 ]
Birje, Mahantesh N. [2 ]
机构
[1] Basaveshwar Engn Coll, Vidyagiri 587103, Bagalkot, India
[2] Visvesvaraya Technol Univ, Ctr PG Studies, Belagavi 590018, India
来源
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE | 2020年 / 167卷
关键词
Attribute-based Encryption; Access Structure; Access Control; Privileged User; Multi-authority; Cloud Storage; PROXY RE-ENCRYPTION; SECURE;
D O I
10.1016/j.procs.2020.03.423
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud users are outsourcing their data day-by-day resulting in huge amount of data storage in Cloud server. Cloud service provider (CSP) themselves may go for modifying the data that leads to data integrity problem. Unauthorized users illegally gain access to the data stored in cloud server. Therefore, providing protection, achieving privacy and access control for user's data are big challenges in the Cloud. Ciphertext-policy attribute-based encryption (CP-ABE) is prominent encryption technique to solve the exigent dilemma of secure data sharing in cloud computing. The shared data files generally have the characteristic of multilevel hierarchy, predominantly in the areas of IT companies, healthcare and military; these areas require a multi-authority access control. However, the hierarchy construction of shared files and multi-authority access control approach are not been investigated in CP-ABE. This paper proposes an efficient multi-authority access control using attribute-based encryption scheme that achieves efficient, fine grained access control. The proposed scheme consists of one algorithm (Role Hierarchy Algorithm (RHA) and Hierarchy Access Structure (HAS) to protect user's data, achieve privacy, multi-authority access control and fine grained access to a stored data. The RHA algorithm classifies Cloud users into groups based on their assigned attributes. The HAS helps to define an access structure for fine grained and multi-authority access control of Cloud resources. Simulation results prove that the proposed RHA, HAS are efficient (in terms of time consumption and storage consumption for encryption, decryption) compared to existing works. The advantages of proposed scheme become more and more conspicuous when there is more number of files at Cloud storage server. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:840 / 849
页数:10
相关论文
共 13 条
[1]  
[Anonymous], 2013, WUHAN UNIV J NAT SCI, DOI DOI 10.1007/s11859-013-0925-9
[2]  
Birje Mahantesh N., 2017, International Journal of Cloud Computing, V6, P32
[3]   Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption [J].
Lewko, Allison ;
Okamoto, Tatsuaki ;
Sahai, Amit ;
Takashima, Katsuyuki ;
Waters, Brent .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 :62-+
[4]   A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing [J].
Liang, Kaitai ;
Au, Man Ho ;
Liu, Joseph K. ;
Susilo, Willy ;
Wong, Duncan S. ;
Yang, Guomin ;
Yu, Yong ;
Yang, Anjia .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 :95-108
[5]  
Liang K, 2014, LECT NOTES COMPUT SC, V8712, P257, DOI 10.1007/978-3-319-11203-9_15
[6]   A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing [J].
Liang, Kaitai ;
Au, Man Ho ;
Liu, Joseph K. ;
Susilo, Willy ;
Wong, Duncan S. ;
Yang, Guomin ;
Tran Viet Xuan Phuong ;
Xie, Qi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) :1667-1680
[7]   Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services [J].
Liu, Joseph K. ;
Au, Man Ho ;
Huang, Xinyi ;
Lu, Rongxing ;
Li, Jin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (03) :484-497
[8]   Fuzzy identity-based encryption [J].
Sahai, A ;
Waters, B .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :457-473
[9]  
ShuLan Wang, 2015, Applied Mechanics and Materials, V701-702, P911, DOI 10.4028/www.scientific.net/AMM.701-702.911
[10]   HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing [J].
Wan, Zhiguo ;
Liu, Jun'e ;
Deng, Robert H. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) :743-754