期刊文献+

Privacy Protection Based Access Control Scheme in Cloud-Based Services 被引量:3

Privacy Protection Based Access Control Scheme in Cloud-Based Services
下载PDF
导出
摘要 With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services. With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.
出处 《China Communications》 SCIE CSCD 2017年第1期61-71,共11页 中国通信(英文版)
基金 financially supported by the National Natural Science Foundation of China(No.61303216,No.61272457,No.U1401251,and No.61373172) the National High Technology Research and Development Program of China(863 Program)(No.2012AA013102) National 111 Program of China B16037 and B08038
关键词 access control data sharing privacy protection cloud-based services access control data sharing privacy protection cloud-based services
  • 相关文献

参考文献1

二级参考文献11

  • 1Sabai A, Waters B. Fuzzy identity-based encryption [ A]. Pro- ceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques [ C ]. Berlin Heidelberg: Springer,2005.457 - 473.
  • 2Goyal Pandey O, Sabai A, et al. Attribute based encryption for" fine-grained access control of encrypted data [ A]. Proceedings of ACM Conference on Computer and Communications Securi- ty [ C] .Alexandria, Virginia, USA: ACM,2006.89 - 98.
  • 3Bethencourt J, Sahai A, Waters B. Ciphertext-policy aUribute- based encryption [ A]. IEEE Symposium on Security and Priva- cy( SP' 07) [ C ]. Berkeley, California, USA: IEEE, 2007.321 - 334.
  • 4Melissa Chase. Multi-authorityattribute based encryption [ A ]. Proceedings of the 4th Theory of Cryptography Conference L C]. Berlin Heidelberg: Springer, 2007.515 - 534.
  • 5Wang G, Liu Q, Wu J. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services E A]. Proceedings of ACM CCS Computer and Communications Se- curity [C].New York,USA:ACM,2010.735- 737.
  • 6Bobba R, Khurana H, Prabhakaran M. Attribute-sets: A practi- cally motivated enhancement to auribute-based encryption [ A ]. Proceedings of ESORICS [ C ]. Berlin Heidelberg: Springer, 2009.587 - 604.
  • 7Li Ming, Yu Shu-cheng,Zlaeng Yao. Scalable andsecure shar- ing of personal health records in cloud computing using at- tribute-based encryption [ J ]. IEEE. Transactions on Parallel and Distributed System,2012,24( 1 ) : 131 - 143.
  • 8冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 9孙国梓,董宇,李云.基于CP-ABE算法的云存储数据访问控制[J].通信学报,2011,32(7):146-152. 被引量:64
  • 10孙昌霞,马文平,陈和风.可证明安全的无中心授权的多授权属性签名[J].电子科技大学学报,2012,41(4):552-556. 被引量:4

共引文献15

同被引文献5

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部