Hierarchical Attribute-Based Encryption for Fine-Grained Access Controlin Cloud Storage Services

被引:200
作者
Wang, Guojun [1 ]
Liu, Qin [1 ]
Wu, Jie [2 ]
机构
[1] Cent South Univ Technol, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
来源
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10) | 2010年
基金
中国国家自然科学基金;
关键词
cloud computing; hierarchical attribute-based encryption; fine-grained access control; scalability;
D O I
10.1145/1866307.1866414
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and medium-sized enterprises with limited budgets, they can achieve cost savings and productivity enhancements by using cloud-based services to manage projects, to make collaborations, and the like. However, allowing cloud service providers (CSPs), which are not in the same trusted domains as enterprise users, to take care of confidential data, may raise potential security and privacy issues. To keep the sensitive user data confidential against untrusted CSPs, a natural way is to apply cryptographic approaches, by disclosing decryption keys only to authorized users. However, when enterprise users outsource confidential data for sharing on cloud servers, the adopted encryption system should not only support fine-grained access control, but also provide high performance, full delegation, and scalability, so as to best serve the needs of accessing data anytime and anywhere, delegating within enterprises, and achieving a dynamic set of users. In this paper, we propose a scheme to help enterprises to efficiently share confidential data on cloud servers. We achieve this goal by first combining the hierarchical identity-based encryption (HIBE) system and the ciphertext-policy attribute-based encryption (CP-ABE) system, and then making a performance-expressivity tradeoff, finally applying proxy re-encryption and lazy re-encryption to our scheme.
引用
收藏
页码:735 / 737
页数:3
相关论文
共 3 条
[1]  
Gentry C., P ASIACRYPT 2002, P548
[2]  
Muller S., PROCEEDINGS OF ICISC, P20
[3]   Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing [J].
Yu, Shucheng ;
Wang, Cong ;
Ren, Kui ;
Lou, Wenjing .
2010 PROCEEDINGS IEEE INFOCOM, 2010,