[go: up one dir, main page]

Computer Science ›› 2016, Vol. 43 ›› Issue (9): 180-183.doi: 10.11896/j.issn.1002-137X.2016.09.035

Previous Articles     Next Articles

High Efficiency Multi-authority Cloud Access Control Scheme

ZHOU Peng-xu and LI Cheng-hai   

  • Online:2018-12-01 Published:2018-12-01

Abstract: For solving the overhead problems of users in the multi-authority access control schemes,a HE-MA-ACS scheme was proposed.Outsourced decryption is introduced based on the hierarchical authorization structure,so large part of the decryption overhead is moved to the CSP.Furthermore,fine-grained attribute revocation is achieved and the users can not participate in the operation when their attributes are revoked.The correctness,security,calculated and storage performance were analyzed.Experimental results demonstrate the superiority of overhead in user storage,access communication,decryption and the computation costs when attribute is revoked as well.The scheme effectively reduces the burden on the user side and improves the efficiency of decryption.

Key words: Multi-authority,ABE,Cloud computing,Access control,Outsourced decryption

[1] Feng Deng-guo,Zhang Min,Zhang Yan,et al.Studay on Cloud Computing Security[J].Journal of Software,2011,22(1):71-83(in Chinese) 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83
[2] Lin Chuang,Su Wen-bo,Meng Kun,et al.Cloud Computing Security:Architecture,Mechanism and Modeling[J].Chinese Journal of Computers,2013,9(36):1765-1784(in Chinese) 林闯,苏文博,孟坤,等.云计算安全:架构、机制与模型评价[J].计算机学报,2013,9(36):1765-1784
[3] Hong Cheng,Zhang Min,Feng Deng-guo.Achieving efficientdynamic cryptographic access control in cloud storage[J].Journal on Communications,2011,32(7):125-132(in Chinese) 洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方法[J].通信学报,2011,32(7):125-132
[4] Sahai A,Water B.Fuzzy identity-based encryption[C]∥Proc of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer-Verlag,2005:457-473
[5] Goyal V,Pandey O,Sahai A,et al.Attribute based encryption for fine-grained access control of encrypted data[C]∥Proc of ACM Conference on Computer and Communications Security.New York:ACM Press,2006:89-98
[6] Bethencount J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]∥Proc of IEEE Symposium on Security and Privacy.IEEE Press,2007:321-334
[7] Wen Yu-hui,Chen Guang-yong,Zhao Jin-tao.Solution of dataaccess control with ciphertext-policy attribute-based encryption in cloud computing[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2013,25(5):658-664(in Chinese) 温昱晖,陈广勇,赵劲涛.基于CP-ABE在云计算中实现数据访问控制的方案[J].重庆邮电大学学报(自然科学版),2013,25(5):658-664
[8] Chase M.Multi-Authority attribute based encryption[C]∥Proc of the 4th Theory of Cryptography Conf.Germany:Springer Berlin Heidelberg,2007:515-534
[9] Ruj S,Nayak A,Stojmenovic I.DACC:Distributed access control in clouds[C]∥Proc of the 10th IEEE Int’l Conf.on Trust,Security and Privacy in Computing and Communications.Wa-shington,DC:IEEE Press,2011:91-98
[10] Liu Xue-jiao,Xia Ying-jie,Jiang Sha-sha,et al.Hierarchical attribute-based access control with authentication for outsourced data in cloud computing[C]∥Proc of the 2013 12th IEEE Int’l Conf.on Trust,Security and Privacy in Computing and Communications.Australia:IEEE Press,2013:477-484
[11] Yang Geng,Wang Dong-yang,Zhang Ting,et al.Attribute-Based Access Control with Multi-Authority Structure in Cloud Computing[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science),2014,34(2):2-9(in Chinese) 杨庚,王东阳,张婷,等.云计算环境中基于属性的多权威访问控制方法[J].南京邮电大学学报(自然科学),2014,34(2):2-9
[12] Huang Xiao-fneg,Qi Tao,Qin Bao-dong,et al.Multi-Authority Attribute Based Encryption Scheme Revocation[C]∥2015 24th International Conference on Computer Communication and Networks (ICCCN).IEEE Press,2015:1-5
[13] Chen Yan-li,Song Ling-ling,Yang Geng.Attribute-based access control for multi-authority system with constant size ciphertext in cloud computing[J].Wireless Communication Over Zigbee for Automotive Inclination Measurement China Communications,2016,13(2):146-162
[14] Xu X,Zhou J,Wang X,et al.Multi-Authority proxy re-encryption based on CPABE for cloud storage systems[J].Journal of Systems Engineering and Electronics,2016,27(1):211-223
[15] Chen Dan-wei,Wan Liang-qing,Wang Chen,et al.A Multi-authority Attribute-Based Encryption Scheme with Pre-decryption[C]∥2015 Seventh International Symposium on Parallel Architectures,Algorithms and Programming (PAAP).IEEE Press,2015:223-228
[16] Li Yong,Zeng Zhen-yu,Zhang Xiao-fei.Outsourced decryption scheme supporting attribute revocation[J].Journal of Tsinghua University(Sci & Technol),2013,53(12):1664-1669(in Chinese) 李勇,曾振宇,张晓菲.支持属性撤销的外包解密方案[J].清华大学学报(自然科学版),2013,53(12):1664-1669
[17] Yang Kan,Jia Xiao-hua,Ren Kui,et al.DAC-MACS:Effective data access control for multi-authority cloud storage systems [J].IEEE Transactions on Information Forensics and Security,2013,8(11):1790-1801
[18] Rong Xing,Zhao Yong,Jiang Rong.MMACS:A Multi-Authority Cloud Access Scheme with Mixed Access Structure[C]∥Proc of Workshop on Secure Networking and Forensic Computing.Sydney,NSW:IEEE Press,2014:706-711

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!