ABEBox: A data driven access control for securing public cloud storage with efficient key revocation

被引:1
|
作者
Raso, Emanuele [1 ]
Bracciale, Lorenzo [1 ]
Loreti, Pierpaolo [1 ]
Bianchi, Giuseppe [1 ]
机构
[1] Univ Roma Tor Vergata, Rome, Italy
基金
欧盟地平线“2020”;
关键词
Attribute-Based Encryption; Reverse Hash Chain; ATTRIBUTE-BASED ENCRYPTION;
D O I
10.1145/3465481.3469206
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Besides providing data sharing, commercial cloud-based storage services (e.g., Dropbox) also enforce access control, i.e. permit users to decide who can access which data. In this paper we advocate the separation between the sharing of data and the access control function. We specifically promote an overlay approach which provides end-to-end encryption and empowers the end users with the possibility to enforce access control policies without involving the cloud provider itself. To this end, our proposal, named ABEBox, relies on the careful combination of i) attribute-based encryption for custom policy definition and management, with ii) proxy re-encryption to provide scalable re-keying and protection to key-scraping attacks, with a novel revocation procedure. Moreover, iii) we concretely embed our protection mechanisms inside a public domain virtual file system module to provide an overlay and trivial-to-use transparent service which can be deployed on top of any arbitrary cloud storage provider.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] A Fine Grained Access Control and Flexible Revocation Scheme for Data Security on Public Cloud Storage Services
    Eissa, Tameem
    Cho, Gi-Hwan
    [J]. 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 27 - 33
  • [2] Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation
    [J]. Zhou, Junwei (junweizhou@msn.com), 1600, Oxford University Press (60):
  • [3] Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation
    Zhou, Junwei
    Duan, Hui
    Liang, Kaitai
    Yan, Qiao
    Chen, Fei
    Yu, F. Richard
    Wu, Jieming
    Chen, Jianyong
    [J]. COMPUTER JOURNAL, 2017, 60 (08): : 1210 - 1222
  • [4] Role and Time-based Access Control with Efficient Revocation for Cloud Storage
    Li, Fenghua
    Wang, Yanchao
    Xiong, Jinbo
    Xie, Rongna
    [J]. 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 284 - 289
  • [5] Efficient Decentralized Attribute-based Access Control for Cloud Storage with User Revocation
    Chen, Jianwei
    Ma, Huadong
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3782 - 3787
  • [6] Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems
    Li, Xiaoyu
    Tang, Shaohua
    Xu, Lingling
    Wang, Huaqun
    Chen, Jie
    [J]. IEEE ACCESS, 2017, 5 : 393 - 405
  • [7] Securing Public Data Storage in Cloud Environment
    Boopathy, D.
    Sundaresan, M.
    [J]. ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I, 2014, 248 : 555 - 562
  • [8] A Secure and Efficient Revocation Scheme for Fine-Grained Access Control in Cloud Storage
    Lv, Zhiquan
    Hong, Cheng
    Zhang, Min
    Feng, Dengguo
    [J]. 2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [9] Securing smart grid data under key exposure and revocation in cloud computing
    Navya, J. M.
    Sanjay, H. A.
    Deepika, K. M.
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROL, COMMUNICATION AND COMPUTING (I4C), 2018,
  • [10] A survey of attribute-based access control with user revocation in cloud data storage
    [J]. Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):