A Robust Generic Multi-Authority Attributes Management System for Cloud Storage Services

被引:10
作者
Ibrahim, Ibrahim Mostafa [1 ]
Mostafa, Mostafa G. M. [2 ]
El-Din, Sherif H. Nour [1 ]
Elgohary, Rania [2 ]
Faheem, Hossam [2 ]
机构
[1] CSIRC Cent Bank Egypt, Cairo Governorate 11511, Egypt
[2] Ain Shams Univ, Cairo 11566, Egypt
关键词
Attribute based encryption; proxy re-encryption; public key infrastructure; cloud computing; digital; DATA ACCESS-CONTROL; ENCRYPTION; EFFICIENT; SCHEME;
D O I
10.1109/TCC.2018.2867871
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute Based Encryption (ABE) schemes face number of essential challenges for achieving data privacy in Cloud Storage Services (CSS). One crucial challenge is the existence of a single authority for attributes management. The second challenge is the lack of an efficient attribute revocation mechanism that prohibits an unauthorized access instantaneously after an attribute revocation is requested. The third challenge is the avoidance of using attribute revocation scenario as a mechanism for user revocation. In this paper, a robust generic multi-authority attributes management system is presented to overcome these challenges for CSS. The proposed system can be implemented using either Ciphertext Policy ABE (CP-ABE) or Key Policy ABE (KP-ABE) technique that possesses a specific set of characteristics. In addition, the proposed system presents a novel structure for user digital identity that prohibits the collusion between system users. Moreover, the proposed system does not oblige cooperation between the participated attributes authorities to accomplish any of the proposed system tasks. Furthermore, the attributes authorities can join or leave the proposed system without mandating the proposed system re-initialization. Finally, the presented performance measures prove the proposed system validity to accomplish all the specified goals with acceptable performance.
引用
收藏
页码:435 / 446
页数:12
相关论文
共 43 条
[1]  
[Anonymous], 2008, RFC 5246
[2]  
[Anonymous], 6101 RFC
[3]  
[Anonymous], 1984, LNCS
[4]  
[Anonymous], RECOMMENDATION TRIPL
[5]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[6]  
Bethencourt J., P 28 IEEE S SEC PRIV
[7]  
Binbusayyis A., 2015, P INT C CLOUD TECHN, P1
[8]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[9]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[10]  
Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185