中国邮电高校学报(英文) ›› 2015, Vol. 22 ›› Issue (2): 38-43.doi: 10.1016/S1005-8885(15)60637-9

• Artificial Intelligence • 上一篇    下一篇

Method of secure, scalable, and fine-grained data access control with efficient revocation in untrusted cloud

宋玲娓   

  1. 北京邮电大学信息安全中心
  • 收稿日期:2014-05-21 修回日期:2014-09-30 出版日期:2015-04-30 发布日期:2015-04-22
  • 通讯作者: 宋玲娓 E-mail:songlw@bupt.edu.cn
  • 基金资助:

    数字版权研发工程项目;北京高等学校青年英才计划项目;教育部科技发展中心网络时代的科技论文快速共享专项研究资助课题;中央高校基本科研业务费专项资金资助;国家科技支撑计划;国家863计划

Method of secure, scalable, and fine-grained data access control with efficient revocation in untrusted cloud

Ling-Wei SONG   

  • Received:2014-05-21 Revised:2014-09-30 Online:2015-04-30 Published:2015-04-22
  • Contact: Ling-Wei SONG E-mail:songlw@bupt.edu.cn
  • Supported by:

    Digital Right Management Technology Research and Development Project;Beijing Higher Education Young Elite Teacher Project;Specialized Research Fund for the Doctoral Program of Higher Education;National Key project of Scientific and Technical Supporting Programs of China;National 863 Program (2012AA012606)

摘要:

Cloud computing is a developing computing paradigm in which resources of the computing infrastructure are provided as services over the network. Hopeful as it is, this paradigm also brings new challenges for data security and encryption storage when date owner stores sensitive data for sharing with untrusted cloud servers. When it comes to fine-grained data and scalable access control, a huge computation for key distribution and data management is required. In this article, we achieved this goal by exploiting and uniquely combining techniques of ciphertext-policy attribute-based encryption (CP-ABE), linear secret sharing schemes (LSSS), and counter (CTR) mode encryption. The proposed scheme is highly efficient by conducting the revocation on attribute level rather than on user level. The goals of data confidentiality and no collusion attack (even the cloud servers (CS) collude with users), as well as ones of fine-grainedness and scalability, are also achieved in our access structure.

关键词:

CP-ABE, revocation, fine-grained, counter mode encryption, cloud computing

Abstract:

Cloud computing is a developing computing paradigm in which resources of the computing infrastructure are provided as services over the network. Hopeful as it is, this paradigm also brings new challenges for data security and encryption storage when date owner stores sensitive data for sharing with untrusted cloud servers. When it comes to fine-grained data and scalable access control, a huge computation for key distribution and data management is required. In this article, we achieved this goal by exploiting and uniquely combining techniques of ciphertext-policy attribute-based encryption (CP-ABE), linear secret sharing schemes (LSSS), and counter (CTR) mode encryption. The proposed scheme is highly efficient by conducting the revocation on attribute level rather than on user level. The goals of data confidentiality and no collusion attack (even the cloud servers (CS) collude with users), as well as ones of fine-grainedness and scalability, are also achieved in our access structure.

Key words:

CP-ABE, revocation, fine-grained, counter mode encryption, cloud computing