Temporal Access Control with User Revocation for Cloud Data

被引:9
|
作者
Balani, Nihal [1 ]
Ruj, Sushmita [2 ]
机构
[1] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
[2] Indian Stat Inst, RC Bose Ctr Cryptol & Secur, Kolkata, India
关键词
Access Control; Cloud Storage; CP-ABE; Temporal Access Control; Revocation;
D O I
10.1109/TrustCom.2014.45
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a temporal access control scheme to protect and selectively access data in clouds. In many applications like healthcare, online tests, social networks, data should be accessed within a certain period of time. Although access control has been widely studied, temporal access control has not received attention. Ours is the first scheme on temporal access control with user revocation. Our scheme encrypts and stores data in clouds in such a way that only authorized users are able to decrypt it within a specified time period. We use a new variant of attribute-based encryption in order to achieve our objective. To reduce computational load during decryption, we partially outsource the decryption to a proxy server, who can gain no information about the data. We analytically show that our scheme has comparable computation and communication costs, but also supports revocation, which was not present in previous schemes.
引用
收藏
页码:336 / 342
页数:7
相关论文
共 50 条
  • [21] Secure deduplication for multimedia data with user revocation in cloud storage
    Hyunsoo Kwon
    Changhee Hahn
    Daeyoung Kim
    Junbeom Hur
    Multimedia Tools and Applications, 2017, 76 : 5889 - 5903
  • [22] Public Auditing for Shared Data with Efficient User Revocation in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2904 - 2912
  • [23] Public Auditing for shared data in cloud with safe user revocation
    Samundiswary, S.
    Dongre, Nilima M.
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1, 2017, : 53 - 57
  • [24] Resource Allocation Between Temporal Cloud Database and User Using Access Control
    Muthurajkumar, S.
    Vijayalakshmi, M.
    Kannan, A.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [25] Access Privilege Elevation and Revocation in Collusion-Resistant Cloud Access Control
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    PROCEEDINGS OF THE 2018 SECOND WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4), 2018, : 209 - 214
  • [26] ABEBox: A data driven access control for securing public cloud storage with efficient key revocation
    Raso, Emanuele
    Bracciale, Lorenzo
    Loreti, Pierpaolo
    Bianchi, Giuseppe
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [27] Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation
    Luo, Yuchuan
    Xu, Ming
    Fu, Shaojing
    Wang, Dongsheng
    Deng, Junquan
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 434 - 442
  • [28] A cloud-user access control mechanism based on data masking
    Wu, Ting-Kuang
    Lin, Yung-Wang
    Lin, Iuon-Chang
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 165 - 168
  • [29] Public Auditing for Shared Data Utilizing Backups with User Revocation in the Cloud
    LIU Hequn
    WANG Baocang
    LU Ke
    GAO Ziyuan
    ZHAN Yu
    WuhanUniversityJournalofNaturalSciences, 2018, 23 (02) : 129 - 138
  • [30] Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (01) : 92 - 106