Attribute-based cloud storage with secure provenance over encrypted data

被引:20
|
作者
Cui, Hui [1 ,2 ]
Deng, Robert H. [1 ]
Li, Yingjiu [1 ]
机构
[1] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
[2] RMIT Univ, Sch Sci, Melbourne, Vic, Australia
基金
新加坡国家研究基金会;
关键词
Cloud storage; Secure provenance; Access control; Scalability; Confidentiality; Anonymity; Traceability; Revocation;
D O I
10.1016/j.future.2017.10.010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To securely and conveniently enjoy the benefits of cloud storage, it is desirable to design a cloud data storage system which protects data privacy from storage servers through encryption, allows fine-grained access control such that data providers can expressively specify who are eligible to access the encrypted data, enables dynamic user management such that the total number of data users is unbounded and user revocation can be carried out conveniently, supports data provider anonymity and traceability such that a data provider's identity is not disclosed to data users in normal circumstances but can be traced by a trusted authority if necessary, and equally important, provides secure data provenance by presenting irrefutable evidence on who has created and modified the data in the cloud. However, most of the existing cloud storage systems with secure provenance either lack the expressiveness in access control or incur too much performance overhead or do not support dynamic user management. In this paper, we solve these problems by presenting an attribute-based cloud storage system with secure provenance. We first give a simple construction without achieving user revocation, and then extend it with an efficient revocation mechanism to prevent revoked data users from accessing the newly encrypted data. Thereafter, we implement the algorithms in the proposed two constructions to evaluate their performance. Our experimental results show that the proposed systems are acceptable to be applied in practice. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:461 / 472
页数:12
相关论文
共 50 条
  • [21] Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data
    He, Kai
    Guo, Jun
    Weng, Jian
    Weng, Jiasi
    Liu, Joseph K.
    Yi, Xun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1207 - 1217
  • [22] A secure billing protocol over attribute-based encryption in vehicular cloud computing
    Nkenyereye, Lewis
    Park, Youngho
    Rhee, Kyung Hyune
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [23] VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
    Zheng, Qingji
    Xu, Shouhuai
    Ateniese, Giuseppe
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 522 - 530
  • [24] A secure billing protocol over attribute-based encryption in vehicular cloud computing
    Lewis Nkenyereye
    Youngho Park
    Kyung Hyune Rhee
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [25] Secure Cloud Auditing over Encrypted Data
    Shaikh, Sarah
    Vora, Deepali
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 693 - 697
  • [26] Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage
    Koo, Dongyoung
    Hur, Junbeom
    Yoon, Hyunsoo
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 229 - 235
  • [27] An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service
    Nyamsuren Vaanchig
    Wei Chen
    Zhi-Guang Qin
    Journal of Electronic Science and Technology, 2017, 15 (01) : 90 - 98
  • [28] EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing
    Huang Qinlong
    Ma Zhaofeng
    Yang Yixian
    Fu Jingyi
    Niu Xinxin
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (04) : 862 - 868
  • [29] Secure Sharing of IOT Data in Cloud Environment Using Attribute-Based Encryption
    Kanimozhi, P.
    Victoire, T. Aruldoss Albert
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (06)
  • [30] Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud
    Wu, Qing
    Lai, Taotao
    Zhang, Leyou
    Mu, Yi
    Rezaeibagha, Fatemeh
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 129