期刊文献+

NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems 被引量:9

NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems
下载PDF
导出
摘要 The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption(NC-MACPABE). NC-MACPABE optimizes the weighted access structure(WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users' information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user's access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time. The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption(NC-MACPABE). NC-MACPABE optimizes the weighted access structure(WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users' information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user's access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time.
作者 XU Xiao-long ZHANG Qi-tong ZHOU Jing-lan 徐小龙;张栖桐;周静岚
出处 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第4期807-818,共12页 中南大学学报(英文版)
基金 Projects(61472192,61202004)supported by the National Natural Science Foundation of China Project(14KJB520014)supported by the Natural Science Fund of Higher Education of Jiangsu Province,China
关键词 cloud storage data PRIVACY PROXY re-encryption multi-authority cloud storage data privacy proxy re-encryption multi-authority
  • 相关文献

参考文献3

二级参考文献49

  • 1Sandberg R, Goldberg D, Kleiman S, et al. Design and implementation of the SUN network filesystem. In: Proceedings of the Summer USENIX Conference, Portland, USA, 1985. 119-130.
  • 2Callaghan B, Pawlowski B, Staubach P. NFS version protocol specification. RFC 1813, 1995.
  • 3Braam P J. The Lustre storage architecture, http://www.lustre,org/documentation.html.
  • 4Braam P J. The Lustre storage architecture. Cluster File Systems, Inc., Aug. 2004. http://www.lustre.org/documentation.html.
  • 5Amazon.com. Amazon simple storage service (Amazon S3). http://aws.amazon.com/s3.
  • 6Weil S A, Brandt S A, Miller E L, et al. Ceph: A scalable, high-performance distributed file system. In: Proceedings of OSDI, Seattle, USA, 2006. 22.
  • 7Hasan R, Myagmar S, Lee A J, et al. Toward a threat model for storage systems. In: Proceedings of StorageSS, Fairfax, USA, 2005. 94-102.
  • 8Data Breach Investigation Report, Verizon, 2010. http://www.verizonbusiness.com/resources/reports/rp-2010-data-breach-report-en-xg, pdf.
  • 9Kallahalla M, Riedel E, Swaininathan R, et al. Plutus-scalable secure file sharing on untrusted storage. In: Proceedings of the 2nd USENIX File and Storage Technologies, San Francisco, USA, 2003.
  • 10Riedel E, Kallahalla M, Swaminathan R. A framework for evaluating storage system security. In: Proceedings of FAST, Monterey, USA, 2002. 15-30.

共引文献65

同被引文献30

引证文献9

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部