Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud

被引:3
作者
Lian, Zheng [1 ,2 ]
Su, Mang [1 ]
Fu, Anmin [1 ,2 ]
Wang, Huaqun [2 ]
Thou, Chunyi [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210023, Peoples R China
来源
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2020年
基金
中国国家自然科学基金;
关键词
Hybrid Cloud; Proxy Re-encryption; Access Control; Multi-factor Description; EFFICIENT;
D O I
10.1109/icc40277.2020.9149306
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Hybrid cloud has both the strong computing power of public cloud and easy control of private cloud. It provides users with robust services and convenience, meanwhile faces numerous security challenges. How to implement the effective access control is one of them, the purpose of which is deploying policy in private cloud to protect the ciphertext in public cloud. Furthermore, it becomes more and more difficult to describe the access control policy, which is suitable for multi-factor and dynamic updating. Considering the issues above, we propose a proxy re-encryption (PRE) scheme for complicated access control factors description in hybrid cloud. Firstly, we build the system model combining PRE with access control in hybrid cloud. Secondly, we design the algorithm for our scheme including the key construction with multi-factor and its weight, which achieve the target of dynamic updating. Finally, we analyze the security of this scheme by the mathematical method and performance by theory, experiment and comparisons with some other works. Our scheme has made the deployment of access control in hybrid cloud more reliable and scalable.
引用
收藏
页数:6
相关论文
共 16 条
  • [1] Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization
    Fu, Anmin
    Chen, Zhenzhu
    Mu, Yi
    Susilo, Willy
    Sun, Yinxia
    Wu, Jie
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 266 - 278
  • [2] Fugkeaw S, 2016, IEEE INT CONF CLOUD, P894, DOI [10.1109/CLOUD.2016.129, 10.1109/CLOUD.2016.0131]
  • [3] A framework for integrating geospatial information systems and hybrid cloud computing
    Helmi, Abdelrahman M.
    Farhan, Marwa S.
    Nasr, Mona M.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 67 : 145 - 158
  • [4] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [5] ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms
    Kuang, Boyu
    Fu, Anmin
    Yu, Shui
    Yang, Guomin
    Su, Mang
    Zhang, Yuqing
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 8372 - 8383
  • [6] Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System
    Li, Wen-Min
    Li, Xue-Lei
    Wen, Qiao-Yan
    Zhang, Shuo
    Zhang, Hua
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2017, 32 (05) : 974 - 990
  • [7] A Novel Role-based Access Control Model in Cloud Environments
    Luo, Jun
    Wang, Hongjun
    Gong, Xun
    Li, Tianrui
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2016, 9 (01) : 1 - 9
  • [8] Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud
    Su M.
    Wang L.
    Fu A.
    Yu Y.
    [J]. Journal of Shanghai Jiaotong University (Science), 2018, 23 (5) : 666 - 670
  • [9] Park J. S., 2001, ACM Transactions on Information and Systems Security, V4, P37, DOI 10.1145/383775.383777
  • [10] Samy I, 2017, ANN ALLERTON CONF, P1, DOI 10.1109/ALLERTON.2017.8262711