Efficient and scalable outsourced data access control with user revocation in cloud: A comprehensive study

被引:3
作者
Debnath, S. [1 ]
Bhuyan, B. [2 ]
机构
[1] Mizoram Univ, Dept Informat Technol, Mizoram, India
[2] North Eastern Hill Univ, Dept Informat Technol, Shillong, Meghalaya, India
关键词
Access control; cloud computing; data outsourcing; privacy; security; attribute revocation;
D O I
10.3233/MGS-180297
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data outsourcing into the third party cloud server has been radically increasing with the expanding popularity of cloud computing. Recently, researchers are more attentive on privacy preserved secure outsourced data access control due to data sensibility, gradually growth of data in size, dynamic nature of data user, accessing the data in lightweight device etc. Dynamic and efficient revocable data access control using attribute based encryption (ABE) is most prominent technology for such situation. In this article, we are concentrating to summarize several existing approaches to identify the current scenario of outsourced data access control in cloud with respect to security, privacy and efficient revocation. We are also concern about significant analysis of numerous advanced technologies to achieve dynamic and efficient revocable outsourced data access control for further research with respect to reliability, scalability and efficiency. We have presented here a comprehensive study and analysis of several functionalities of ABE, revocation and privacy preservation.
引用
收藏
页码:383 / 401
页数:19
相关论文
共 52 条
[1]   FAME: Fast Attribute-based Message Encryption [J].
Agrawal, Shashank ;
Chase, Melissa .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :665-682
[2]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[3]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5921, P278, DOI 10.1007/978-3-642-10868-6_17
[4]   Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems [J].
Barsoum, Ayad ;
Hasan, Anwar .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (12) :2375-2385
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[9]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[10]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456