Implementing Secure Data Access Control for Multi-authority Cloud Storage System Using Ciphertext Policy-Attribute Based Encryption

被引:0
|
作者
Lekshmi, S. Vijaya [1 ]
Revathi, M. P. [2 ]
机构
[1] JJ Coll Engn & Technol, Dept Comp Sci & Engn, Tiruchirappalli, Tamil Nadu, India
[2] JJ Coll Engn & Technol, Tiruchirappalli, Tamil Nadu, India
关键词
Access Control; CP-ABE; Decryption Outsourcing; Attribute Revocation; proxy re-encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. In a multi-authority Attribute Based Encryption scheme, multiple attribute-authorities monitor different sets of attributes and issue corresponding decryption keys to users, and encryptors can require that a user obtain keys for appropriate attributes from each authority before decrypting a message. Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control of shared data. In CP-ABE, each user is associated with a set of attributes and data are encrypted with access structures on attributes. A user is able to decrypt a ciphertext if and only if his attributes satisfy the ciphertext access structure. An important issue of attribute revocation is cumbersome for CP-ABE schemes. This challenging issue is considering by more practical scenarios in which semi-trustable on-line proxy servers are available. The proposed solution enables the multi-authority to revoke user attributes with minimal effort. This is achieve by uniquely integrating the technique of proxy re-encryption with CP-ABE, and enable the authority to delegate most of laborious tasks to proxy servers. The proposed scheme is provably secure against chosen ciphertext attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage
    Fan Yundong
    Wu Xiaoping
    Wang Jiasheng
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 205 - 212
  • [2] An Efficient Ciphertext Policy-Attribute Based Encryption for Big Data Access Control in Cloud Computing
    Kumar, P. Praveen
    Kumar, P. Syam
    Alphonse, P. J. A.
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 114 - 120
  • [3] Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage
    Challagidad, Praveen S.
    Birje, Mahantesh N.
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 840 - 849
  • [4] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Zhong, Hong
    Zhu, Wenlong
    Xu, Yan
    Cui, Jie
    SOFT COMPUTING, 2018, 22 (01) : 243 - 251
  • [5] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Hong Zhong
    Wenlong Zhu
    Yan Xu
    Jie Cui
    Soft Computing, 2018, 22 : 243 - 251
  • [6] Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    IEEE ACCESS, 2018, 6 : 34051 - 34074
  • [7] Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Xiong, Jinbo
    Liu, Ximeng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4098 - 4109
  • [8] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [9] Secure Data Access Control for multi-authority Quantum based Cloud Storage
    Vidya, K.
    Abinaya, A.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 387 - 391
  • [10] An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption
    Hu, Ronglei
    Ma, Ziwei
    Li, Li
    Zuo, Peiliang
    Li, Xiuying
    Wei, Jiaxin
    Liu, Sihui
    SENSORS, 2023, 23 (19)