Owner Specified Excessive Access Control for Attribute Based Encryption

被引:9
作者
Khan, Fawad [1 ,2 ]
Li, Hui [2 ]
Zhang, Liangxuan [2 ]
机构
[1] Xidian Univ, Sch Int Educ, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute; partial; full; encryption; decryption; symmetric key; chunk; excessive access; repetition; fractional; EFFICIENT;
D O I
10.1109/ACCESS.2016.2632132
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) has emerged as a promising solution for access control to diverse set of users in cloud computing systems. Policy can just specify whether (or not) any specific user should be given access to data, but it lacks to provide data owner the privilege to specify (how much) fraction, or (which) specific chunk from that data to be accessed or decrypted. In this paper, we address this issue, and propose a scheme that will give data owner excessive access control, so that he can specify specific chunk out of total data to be accessed by user depending on his attributes. In our scheme, a data owner can encrypt data over attributes specified in a policy, but even if user's attributes satisfy the policy; he can decrypt data (partially or fully) fractionally based on his attributes specified by owner. The owner can also prioritize user's access based on his designation, or hierarchal role in a specific organization. We also address to resolve the issue of attributes repetition, due to which the cost of computations in encryption by owner and ciphertext size is reduced. Furthermore, we achieve it with a single ciphertext over policy for entire data, and proof our scheme to be secure in the generic group and random oracle model. Theoretical comparisons of computations with existing constructions, and performance of the scheme evaluated in the Charm simulator is reasonable enough to be adopted in practice.
引用
收藏
页码:8967 / 8976
页数:10
相关论文
共 34 条
[31]  
Xiaohui Li, 2012, Internet and Distributed Computing Systems. 5th International Conference (IDCS 2012). Proceedings, P146, DOI 10.1007/978-3-642-34883-9_12
[32]   Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage [J].
Yang, Kan ;
Jia, Xiaohua .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (07) :1735-1744
[33]  
Yun A., 2009, Proceedings of 2009 ACM workshop on cloud computing security CCSA'09, P67
[34]  
Zhang Yinghui., 2013, ASIACCS, P511, DOI 10.1145/2484313.2484381