HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing

被引:310
|
作者
Wan, Zhiguo [1 ,2 ]
Liu, Jun'e [1 ,2 ]
Deng, Robert H. [3 ]
机构
[1] Tsinghua Univ, Minist Educ, Tsinghua Natl Lab Informat Sci & Technol, Key Lab Informat Syst Secur, Beijing 100084, Peoples R China
[2] Tsinghua Univ, Sch Software, Beijing 100084, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Access control; cloud computing; data security;
D O I
10.1109/TIFS.2011.2172209
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing has emerged as one of the most influential paradigms in the IT industry in recent years. Since this new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. Several schemes employing attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing; however, most of them suffer from inflexibility in implementing complex access control policies. In order to realize scalable, flexible, and fine-grained access control of outsourced data in cloud computing, in this paper, we propose hierarchical attribute-set-based encryption (HASBE) by extending ciphertext-policy attribute-set-based encryption (ASBE) with a hierarchical structure of users. The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility and fine-grained access control in supporting compound attributes of ASBE. In addition, HASBE employs multiple value assignments for access expiration time to deal with user revocation more efficiently than existing schemes. We formally prove the security of HASBE based on security of the ciphertext-policy attribute-based encryption (CP-ABE) scheme by Bethencourt et al. and analyze its performance and computational complexity. We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments.
引用
收藏
页码:743 / 754
页数:12
相关论文
共 50 条
  • [32] Policy Adaptation in Hierarchical Attribute-based Access Control Systems
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (03)
  • [33] Attribute-Based Keyword Search and Data Access Control in Cloud
    Li, Jiazhi
    Zhang, Lei
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 382 - 386
  • [34] An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing
    Xie, Xingxing
    Ma, Hua
    Li, Jin
    Chen, Xiaofeng
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (16) : 2349 - 2367
  • [35] Flexible Access Control for Outsourcing Personal Health Services in Cloud Computing using Hierarchical Attribute Set Based Encryption
    Kandasamy, V
    Papitha, E.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 569 - 571
  • [36] Hierarchical Attribute Based Proxy Re-Encryption Access Control in Cloud Computing
    Chandar, P. Praveen
    Muthuraman, D.
    Rathinraj, M.
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1565 - 1570
  • [37] An Attribute-based Access Control Scheme in Cloud Storage Environment
    Xing, M. H.
    Li, W. M.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION TECHNOLOGY (SEIT2015), 2016, : 129 - 134
  • [38] Dynamic Attribute-Based Access Control in Cloud Storage Systems
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    Zhang, Chunkai
    Zhao, Xiaomeng
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 129 - 137
  • [39] Attribute-based bilateral access control scheme for cloud storage
    Li Q.
    Fan H.
    Chen W.
    Xiong J.
    Han L.
    Li R.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (04): : 128 - 136
  • [40] Cooperative attribute-based access control for enterprise computing system
    Li, Mengting
    Huang, Xinyi
    Liu, Joseph K.
    Xu, Li
    Wu, Wei
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 191 - 202