Dynamic Attribute-Based Access Control in Cloud Storage Systems

被引:0
作者
Liu, Zechao [1 ]
Jiang, Zoe L. [1 ,2 ]
Wang, Xuan [1 ,3 ]
Yiu, S. M. [4 ]
Zhang, Chunkai [1 ]
Zhao, Xiaomeng [2 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] Guangdong Prov Key Lab High Performance Comp, Shenzhen, Peoples R China
[3] Publ Serv Platform Mobile Internet Applicat Secur, Shenzhen, Peoples R China
[4] Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
来源
2016 IEEE TRUSTCOM/BIGDATASE/ISPA | 2016年
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
cloud storage; attribute-based access control; large universe; multi-authority; attribute revocation; policy updating; SECURE; EFFICIENT;
D O I
10.1109/TrustCom.2016.54
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage service allows data owner to store their big data in the cloud and provides data access to the users. As the cloud server is not trustworthy, we cannot rely on the server to conduct data access control. To protect data security and privacy, Attribute-Based Encryption (ABE) is a promising technique for data access control in cloud storage, because it provides data owner more direct control on access policies. However, there are two dynamic issues, namely attribute revocation and policy updating, that should be solved first before deploying ABE in practice. In this paper, we design a dynamic attribute-based access control scheme, which can solve the above two problems simultaneously. Besides, our scheme can support large universe of attributes, which makes it more available in cloud storage system. The proposed scheme is proved statically secure in random oracle model.
引用
收藏
页码:129 / 137
页数:9
相关论文
共 27 条
[1]  
Beimel A., 1996, SECURE SCHEMES SECRE
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[4]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[5]  
Chen JW, 2014, IEEE ICC, P3782, DOI 10.1109/ICC.2014.6883910
[6]  
Chen Y, 2014, LECT NOTES COMPUT SC, V8544, P274
[7]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[8]   Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems [J].
Hur, Junbeom ;
Noh, Dong Kun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) :1214-1221
[9]  
Kaitai Liang, 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems, P552, DOI 10.1109/INCoS.2013.103
[10]   Decentralizing Attribute-Based Encryption [J].
Lewko, Allison ;
Waters, Brent .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 :568-588