Efficiently Attribute-Based Access Control for Mobile Cloud Storage System

被引:8
|
作者
Lv, Zhiquan [1 ,3 ]
Chi, Jialin [1 ,3 ]
Zhang, Min [1 ,2 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Beijing, Peoples R China
关键词
KP-ABE; outsourced key generation; outsourced decryption; revocation; mobile cloud storage;
D O I
10.1109/TrustCom.2014.40
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Similar with other outsourced services, cloud storage faces the serious issue of user data security. To keep data confidential against unauthorized cloud servers and users, Attribute-Based Encryption (ABE) for access control is widely adopted. However, ABE-based access control schemes are being criticized for their high computation overhead, such as in key generation, decryption and revocation. Considering the mobile cloud storage environment where these computation tasks are executed by mobile devices or sensors, this drawback appears more serious. In this paper, we propose an efficient and secure attribute-based access control scheme for mobile cloud storage. Specifically, we construct the first Key-Policy ABE (KP-ABE) scheme with outsourced key generation and decryption, and propose an efficient revocation method for it. Moreover, we prove the proposed scheme is immune to the collusion attack and secure in the standard model. Extensive experiment demonstrates that the efficient key generation, decryption, and revocation are achieved with the help of the cloud servers.
引用
收藏
页码:292 / 299
页数:8
相关论文
共 50 条
  • [21] Contextual attribute-based access control scheme for cloud storage using blockchain technology
    Panda, Suryakanta
    Sahoo, Swagatika
    Halder, Raju
    Mondal, Samrat
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (10): : 2042 - 2062
  • [22] Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    IEEE ACCESS, 2018, 6 : 34051 - 34074
  • [23] Attribute-Based Keyword Search and Data Access Control in Cloud
    Li, Jiazhi
    Zhang, Lei
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 382 - 386
  • [24] Attribute-Based Access Control for Vehicular Edge Cloud Computing
    Cheng, Cheng-Yu
    Liu, Hang
    Hsieh, Li-Tse
    Colbert, Edward
    Cho, Jin-Hee
    2020 IEEE CLOUD SUMMIT, 2020, : 18 - 24
  • [25] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    ACM COMPUTING SURVEYS, 2020, 53 (04)
  • [26] Attribute-Based Solution with Time Restriction Delegate for Flexible and Scalable Access Control in Cloud Storage
    Wang Shoukun
    Wu Kaigui
    Wu Changze
    2016 IEEE/ACM 9TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2016, : 392 - 397
  • [27] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2015, 48 (02) : 85 - 88
  • [28] Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage
    Challagidad, Praveen S.
    Birje, Mahantesh N.
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 840 - 849
  • [29] A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage
    Ahuja, Rohit
    Mohanty, Sraban Kumar
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (01) : 32 - 44
  • [30] Attribute-Based Access Control in an Adaptive Hypermedia System
    Ballesteros, Pedro
    Donoso, Yezid
    2009 FOURTH INTERNATIONAL CONFERENCE ON SYSTEMS (ICONS), 2009, : 114 - 119