Efficiently Attribute-Based Access Control for Mobile Cloud Storage System

被引:8
|
作者
Lv, Zhiquan [1 ,3 ]
Chi, Jialin [1 ,3 ]
Zhang, Min [1 ,2 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Beijing, Peoples R China
关键词
KP-ABE; outsourced key generation; outsourced decryption; revocation; mobile cloud storage;
D O I
10.1109/TrustCom.2014.40
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Similar with other outsourced services, cloud storage faces the serious issue of user data security. To keep data confidential against unauthorized cloud servers and users, Attribute-Based Encryption (ABE) for access control is widely adopted. However, ABE-based access control schemes are being criticized for their high computation overhead, such as in key generation, decryption and revocation. Considering the mobile cloud storage environment where these computation tasks are executed by mobile devices or sensors, this drawback appears more serious. In this paper, we propose an efficient and secure attribute-based access control scheme for mobile cloud storage. Specifically, we construct the first Key-Policy ABE (KP-ABE) scheme with outsourced key generation and decryption, and propose an efficient revocation method for it. Moreover, we prove the proposed scheme is immune to the collusion attack and secure in the standard model. Extensive experiment demonstrates that the efficient key generation, decryption, and revocation are achieved with the help of the cloud servers.
引用
收藏
页码:292 / 299
页数:8
相关论文
共 50 条
  • [1] Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage
    Wang, Shangping
    Zhang, Duo
    Zhang, Yaling
    Liu, Lihua
    IEEE ACCESS, 2018, 6 : 30444 - 30457
  • [2] An Attribute-based Access Control Scheme in Cloud Storage Environment
    Xing, M. H.
    Li, W. M.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION TECHNOLOGY (SEIT2015), 2016, : 129 - 134
  • [3] Dynamic Attribute-Based Access Control in Cloud Storage Systems
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    Zhang, Chunkai
    Zhao, Xiaomeng
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 129 - 137
  • [4] Attribute-based bilateral access control scheme for cloud storage
    Li Q.
    Fan H.
    Chen W.
    Xiong J.
    Han L.
    Li R.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (04): : 128 - 136
  • [5] Efficient Attribute-Based Access Control With Authorized Search in Cloud Storage
    Hao, Jialu
    Liu, Jian
    Wang, Huimei
    Liu, Lingshuang
    Xian, Ming
    Shen, Xuemin
    IEEE ACCESS, 2019, 7 : 182772 - 182783
  • [6] Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 1731 - 1742
  • [7] An Access Control Model for Cloud Storage Using Attribute-Based Encryption
    Sukhodolskiy, Ilya A.
    Zapechnikov, Sergey V.
    PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 578 - 581
  • [8] Efficiently Supporting Attribute-Based Access Control in Linux
    Varshith, H. O. Sai
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2012 - 2026
  • [9] Auditable attribute-based data access control using blockchain in cloud storage
    V. Ezhil Arasi
    K. Indra Gandhi
    K. Kulothungan
    The Journal of Supercomputing, 2022, 78 : 10772 - 10798
  • [10] Auditable attribute-based data access control using blockchain in cloud storage
    Arasi, V. Ezhil
    Gandhi, K. Indra
    Kulothungan, K.
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (08): : 10772 - 10798