Autosoft Journal

Online Manuscript Access


Cloud Storage Access Control Scheme of Ciphertext Algorithm Based on Digital Envelope


Authors



Abstract

Ciphertext Policy Attribute-Based Encryption (CP-ABE) has been widely studied in recent years because it is more suitable for access control of shared data under cloud storage environment. In view of problems of flexibility and efficiency of the existing encryption schemes under cloud storage environment, combined with digital envelopes technology, the paper puts forward an optimized scheme based on supporting fine-grained access control. The scheme has the following advantages: Adopting digital envelopes technology, reducing the computational overhead of Data Owner significantly on the basis of the ensuring data confidentiality, using proxy re-encryption technology to realize the support of user and attribute revocation flexibly, furthermore, the backward and forward secrecy also have been ensured. Adopting security protocols to distribute the shared keys between users and cloud storage server, cloud storage server can save the overhead in maintenance of a large user key2019s tree. Security and performance analysis show that Cloud storage access control scheme of ciphertext algorithm based on digital envelope can ensure the confidentiality of data, resist collusion attack with forward and backward security, and also reduce the calculation works of the user owners and accessing users.


Keywords


Pages

Total Pages: 6
Pages: 289-294

DOI
10.1080/10798587.2015.1095488


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 22
Issue: 2
Year: 2015

Cite this document


References

Bethencourt, John, Amit Sahai, and Brent Waters. "Ciphertext-Policy Attribute-Based Encryption." 2007 IEEE Symposium on Security and Privacy (SP ”07) (2007): n. pag. Crossref. Web. https://doi.org/10.1109/SP.2007.11

Boneh, Dan, Craig Gentry, and Brent Waters. "Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys." Lecture Notes in Computer Science (2005): 258-275. Crossref. Web. https://doi.org/10.1007/11535218_16

Feng, Yansheng, Hua Ma, and Xiaofeng Chen. "Efficient and Verifiable Outsourcing Scheme of Sequence Comparisons." Intelligent Automation & Soft Computing 21.1 (2014): 51-63. Crossref. Web. https://doi.org/10.1080/10798587.2014.915109

Goyal, Vipul et al. "Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data." Proceedings of the 13th ACM conference on Computer and communications security - CCS ”06 (2006): n. pag. Crossref. Web. https://doi.org/10.1145/1180405.1180418

Hur, Junbeom, and Dong Kun Noh. "Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems." IEEE Transactions on Parallel and Distributed Systems 22.7 (2011): 1214-1221. Crossref. Web. https://doi.org/10.1109/TPDS.2010.203

Junod, Pascal, and Alexandre Karlov. "An Efficient Public-Key Attribute-Based Broadcast Encryption Scheme Allowing Arbitrary Access Policies." Proceedings of the tenth annual ACM workshop on Digital rights management - DRM ”10 (2010): n. pag. Crossref. Web. https://doi.org/10.1145/1866870.1866875

Jahid, Sonia, Prateek Mittal, and Nikita Borisov. "EASiER." Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS ”11 (2011): n. pag. Crossref. Web. https://doi.org/10.1145/1966913.1966970

Liang, Xiaohui et al. "Attribute Based Proxy Re-Encryption with Delegating Capabilities." Proceedings of the 4th International Symposium on Information, Computer, and Communications Security - ASIACCS ”09 (2009): n. pag. Crossref. Web. https://doi.org/10.1145/1533057.1533094

Li, Ming et al. "Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption." IEEE Transactions on Parallel and Distributed Systems 24.1 (2013): 131-143. Crossref. Web. https://doi.org/10.1109/TPDS.2012.97

Lv Z. Jisuanji Kexue yu Tansuo

Nabeel, Mohamed, Ning Shang, and Elisa Bertino. "Privacy Preserving Policy-Based Content Sharing in Public Clouds." IEEE Transactions on Knowledge and Data Engineering 25.11 (2013): 2602-2614. Crossref. Web. https://doi.org/10.1109/TKDE.2012.180

Ostrovsky, Rafail, Amit Sahai, and Brent Waters. "Attribute-Based Encryption with Non-Monotonic Access Structures." Proceedings of the 14th ACM conference on Computer and communications security - CCS ”07 (2007): n. pag. Crossref. Web. https://doi.org/10.1145/1315245.1315270

Ruwei, Huang et al. "Study of Privacy-Preserving Framework for Cloud Storage." Computer Science and Information Systems 8.3 (2011): 801-819. Crossref. Web. https://doi.org/10.2298/CSIS100327029R

Sahai, Amit, and Brent Waters. "Fuzzy Identity-Based Encryption." Advances in Cryptology - EUROCRYPT 2005 (2005): 457-473. Crossref. Web. https://doi.org/10.1007/11426639_27

SU, Jin-Shu et al. "Attribute-Based Encryption Schemes." Journal of Software 22.6 (2011): 1299-1315. Crossref. Web. https://doi.org/10.3724/SP.J.1001.2011.03993

Wang, Guojun, Qin Liu, and Jie Wu. "Achieving Fine-Grained Access Control for Secure Data Sharing on Cloud Servers." Concurrency and Computation: Practice and Experience 23.12 (2011): 1443-1464. Crossref. Web. https://doi.org/10.1002/cpe.1698

Xiong A. P. Mathematical Problems in Engineering

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present




CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/