A Novel Multi-Attribute Authority Based Encryption for Controlling Access to Cloud Data
DOI:
https://doi.org/10.31185/eduj.Vol2.Iss25.2737الكلمات المفتاحية:
Aالملخص
Cloud computing has changed the way IT department are working with respect to outsourcing data and having controlled access to the data. In the new computing paradigm that supports on-demand services, the storage service became an attractive service for many cloud users. When data is outsourced to cloud, there is an issue of giving controlled access to the cloud data. Many schemes came into existence. Some of the schemes focus on auditing, provable data possession and proof of irretrievability. Some other schemes threw light into the access control on the cloud data. While giving privileges to accessing data attribute based encryption has achieved significant fine-grained control over the data. In this paper we propose a methodology that can allow controlled access to cloud data with multi-attribute authority based encryption. The multi-attribute based approach is used to make the scheme robust. Moreover the proposed approach is aimed at prevention of identity leakage and also achieves anonymity as well. We built a prototype application that demonstrates the proof of concept. The empirical results revealed that the proposed method improves access control significantly.التنزيلات
المراجع
M. Chase and S. S. M. Chow, “Improving privacy and security in multi-authority attribute-based encryption,” in Proc. 16th CCS, 2009, pp. 121–130.
M. Chase, “Multi-authority attribute based encryption,” in Theory of Cryptography. Berlin, Germany: Springer-Verlag, 2007, pp. 515–534.
K. Yang, X. Jia, K. Ren, and B. Zhang, “DAC-MACS: Effective data access control for multi-authority cloud storage systems,” in Proc. IEEE INFOCOM, Apr. 2013, pp. 2895–2903. JUNG et al.: CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY 199
V. Božovi´c, D. Socek, R. Steinwandt, and V. I. Villányi, “Multi-authority attribute-based encryption with honest-but-curious central authority,” Int. J. Comput. Math., vol. 89, no. 3, pp. 268–283, 2012.
H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,” Inf. Sci., vol. 180, no. 13, pp. 2618–2632, 2010.
S. Müller, S. Katzenbeisser, and C. Eckert, “On multi-authority ciphertext-policy attribute-based encryption,” Bull. Korean Math. Soc., vol. 46, no. 4, pp. 803–819, 2009.
A. Lewko and B. Waters, “Decentralizing attribute-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2011, pp. 568–588.
H. Ma, G. Zeng, Z. Wang, and J. Xu, “Fully secure multi-authority attribute-based traitor tracing,” J. Comput. Inf. Syst., vol. 9, no. 7, pp. 2793–2800, 2013.
J. Li, Q. Huang, X. Chen, S. S. Chow, D. S. Wong, and D. Xie, “Multiauthority ciphertext-policy attribute-based encryption with accountability,” in Proc. 6th ASIACCS, 2011, pp. 386–390.
Y. Zhang, X. Chen, J. Li, D. S. Wong, and H. Li, “Anonymous attributebased encryption supporting efficient decryption test,” in Proc. 8th ASIACCS, 2013, pp. 511–516.
S. Hohenberger and B. Waters, “Attribute-based encryption with fast decryption,” in Public-Key Cryptography. Berlin, Germany: Springer-Verlag, 2013, pp. 162–179.
التنزيلات
منشور
إصدار
القسم
الرخصة
الحقوق الفكرية (c) 2021 Journal of Education College Wasit University

هذا العمل مرخص بموجب Creative Commons Attribution 4.0 International License.
