Fine-grained access control scheme with user privacy protection in cloud storage systems
Papers|更新时间:2024-06-05
|
Fine-grained access control scheme with user privacy protection in cloud storage systems
Journal on CommunicationsVol. 35, Issue Z2, Pages: 42-47(2014)
作者机构:
重庆邮电大学 计算机科学与技术学院,重庆 400065
作者简介:
基金信息:
The National Social Science Foundation of China(14CTQ026);The Natural Science Foundation Project of Chongqing(cstc2011jjA40031);Chongqing Natural Science Foundation(cstc2011jjA40042)
Min XIAO, Chun-lei WANG, You-sheng ZHOU. Fine-grained access control scheme with user privacy protection in cloud storage systems[J]. Journal on Communications, 2014, 35(Z2): 42-47.
DOI:
Min XIAO, Chun-lei WANG, You-sheng ZHOU. Fine-grained access control scheme with user privacy protection in cloud storage systems[J]. Journal on Communications, 2014, 35(Z2): 42-47. DOI: 10.3969/j.issn.1000-436x.2014.z2.007.
Fine-grained access control scheme with user privacy protection in cloud storage systems
Based on the actual demands of cloud storage system
a new multi-authority ABE (MA-ABE) scheme is constructed to support user privacy protection and attribute revocation.For enhancing efficiency and alleviatingowner’s computing load,the complex computing works involved in attribute revocation are delegated to a trusted third party orcloud server.The proposed scheme is provably secure under the DBDH assumption.
关键词
Keywords
references
SAHAI A , WATERS B . Fuzzy identity-based encryption [A ] . Advances in Cryptology-Eurocrypt [C ] . 2005 . 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [A ] . ACM Conference on Computerand Communications Security-CSS [C ] . 2006 . 99 - 112 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [A ] . IEEE Symposium on Security and Privacy [C ] . New York : IEEE Press , 2007 . 321 - 334
YU S , WANG C , REN K , et al . Attribute based data sharing with attribute revocation [A ] . ACM Symp Information,Computer and Comm Security (ASIACCS ’10) [C ] . 2010 .
YANG K , JIA X , REN K . Attribute-based fine-grained access control with efficient revocation in cloud storage systems [A ] . The 8th ACM SIGSAC Symposium on Information,Computer and Communications Security(ASIA CCS’13) [C ] . 2013 . 523 - 528 .
CHASE M . Multi-authority attribute based encryption [A ] . The 4th Theory of Cryptography Conference on Theory of Cryptography (TCC’07) [C ] . Springer , 2007 . 515 - 534 .
CHASE M , CHOW S . Improving privacy and security in multi-authority attribute-based encryption [A ] . The 16th ACM Conference on Computer and Communications Security (CCS’09) [C ] . ACM , 2009 . 121 - 130 .
NAOR M , PINKAS B , REINGOLD O . Distributed pseudo-random functions and KDCs [A ] . Advances in Cryptology:EUROCRYPT '99 (J.Stern,ed.),Lecture Notes in Computer Science [C ] . 1999 .
YANG K , JIA X , REN K , et al . DAC-MACS:effective data access control for multi-authority cloud storage systems [A ] . IEEE INFOCOM [C ] . 2013 . 2895 - 2903 .
YANG K , JIA X . Expressive,efficient and revocable data access control for multiauthority cloud storage [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 : 1735 - 1744 .
JARECKI S , LIU X . Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection [J ] . Theory of Cryptography Lecture Notes in Computer Science , 2009 ,( 5444 ): 577 - 594 .