Xi-xi YAN, Tao GENG. Fused access control scheme for sensitive data sharing[J]. Journal on Communications, 2014, 35(8): 71-77.
DOI:
Xi-xi YAN, Tao GENG. Fused access control scheme for sensitive data sharing[J]. Journal on Communications, 2014, 35(8): 71-77. DOI: 10.3969/j.issn.1000-436x.2014.08.010.
Fused access control scheme for sensitive data sharing
In order to improve security of sensitive data sharing and distributing
fused access control scheme based on the mechanism of attribute-based encryption (ABE) and usage control (UCON) was proposed. The scheme could ensure data confidentiality in the storage
distribution process and control sensitive data sharing scope with dynamic access poli-cies. Additionally
the scheme can prevent legal users operating sensitive data illegally and prohibit privilege abuse for domain user.The results of security analysis and efficiency analysis show that fused access control scheme alleviates the administering burdens on data management server and realizes secure storage and distribution for sensitive data.
MIHAELA I , GIOVANNI R , BRUNO C . Design and implementation of a confidentiality and access control solution for publish/subscribe systems [J ] . Computer networks , 2012 , 56 ( 7 ): 2014 - 2037 .
MUNTES M V , NIN J . Privacy and anonymization for very large datasets [A ] . Proc of the ACM 18th Int'l Conf on Information and Knowledge Management,CIKM 2009 [C ] . New York: Association for Computing Machinery , 2009 . 2117 - 2118 .
WAN Z G , LIU J E , ROBERT H D . HASBE: a hierarchical attrib-ute-based solution for flexible and scalable access control in cloud computing [J ] . IEEE Transactions on Information Forensics and Secu-rity , 2012 , 7 ( 2 ): 743 - 754 .
NUTTAPONG A , JAVIER H , FABIEN L . Attribute-based encryption schemes with constant-size ciphertexts [J ] . Theoretical computer sci-ence , 2012 , 422 ( 9 ): 15 - 38 .
WANG Y T , CHEN K F , LONG Y . Attribute-based traitor tracing [J ] . Journal of Information Science and Engineering , 2011 , 27 ( 1 ): 181 - 195 .
WANG Y T , CHEN K F , LONG Y . Accountable authority key policy attribute-based encryption [J ] . Science China , 2012 , 55 ( 7 ): 1631 - 1638 .
CRAMPTON J , MARTIN K , WILD P . On key assignment for hierar-chical access control [J ] . Proc of the 19th IEEE Computer Security Foundations Workshop—CSFW 2006 [C ] . Venice , 2006 . 5 - 7 .
MALEK B , MIRI A . Combining attribute-based and access sys-tems [J ] . Proc of IEEE CSE2009, the 12th IEEE Int'l Conf on Com-putational Science and Engineering IEEE Computer Society [C ] 2009 . 305 - 312 .
BONEH D , FRANKLIN M . Identity-based encryption from the Weil pairing [J ] . SIAM Journal on Computing , 2003 , 32 ( 3 ): 586 - 615 .
IBRAMI L , PETKOVIC M , NIKOVA S , et al . Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes [R ] . Centre for Telematics and Informa-tion Technology, University of Twente , 2009 .
ROY S , CHUAH M . Secure Data Retrieval Based on Ciphertext Pol-icy Attribute-Based Encryption(CP-ABE) System for the DTN [R ] . 2009 .
BLAZE M , BLEUMER G , STRAISS M . Divertible protocols and atomic proxy cryptography [A ] . EUROCRYPT1998 [C ] . 1998 . 127 - 144 .
YAN X X , MA Z F , YANG Y X , et al . A distribution protocol based on proxy re-encryption in domain environment of E-document manage-ment [J ] . Journal of Beijing University of Posts and Telecommunica-tions , 2012 , 35 ( 5 ): 81 - 84