Revocation Basis and Proofs Access Control for Cloud Storage Multi-Authority Systems

被引:0
|
作者
Riad, Khaled [1 ,2 ]
机构
[1] Univ Sci & Technol Beijing, POB 100083, Beijing, Peoples R China
[2] Zagazig Univ, Dept Math, Fac Sci, POB 44519, Zagazig, Egypt
关键词
Trust; attribute-revocation; access control; cloud storage; multi-authority systems;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Multi-Authority Ciphertext-Policy Attribute-Based Encryption (MA-CP-ABE) is a rising cryptographic primitive for implementing fine-grained attribute-based access control on the outsourced data in cloud storage. However, most of the previous multi-authority attribute-based systems area unit either proved to be secure in a very weak model or lack of potency in user revocation. In this paper, we have introduced the formal definition of the attributes' trust. Also, a new Revocation Basis and Proofs Access Control (RB-PAC) model for cloud storage multi-authority systems has been proposed. Our RB-PAC model ensures secure resource sharing among potential untrusted tenants, supports different access permissions to the same user at the same session, and effectively satisfies both the backward and forward secrecy security requirements. Also, RB-PAC is proven secure against the users' collusion attack. Finally, The experimental results have indicated through the trust dynamics that the trust level for each user is decaying over time. The decryption overhead is largely eliminated and not related to the number of system authorities. Also, a low overhead and short ciphertext update time at different numbers of revoked attributes and revoked users has been achieved.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] MMACS: A Multi-Authority Cloud Access Scheme with Mixed Access Structure
    Rong, Xing
    Zhao, Yong
    Jiang, Rong
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 706 - 711
  • [42] Multi-authority fine-grained access control with accountability and its application in cloud
    Li, Jin
    Chen, Xiaofeng
    Chow, Sherman S. M.
    Huang, Qiong
    Wong, Duncan S.
    Liu, Zheli
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 112 : 89 - 96
  • [43] SPMAC: Secure and privacy-preserving multi-authority access control for fog-enabled IoT cloud storage
    Ma, Ruonan
    Zhang, Leyou
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
  • [44] Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    [J]. IEEE ACCESS, 2018, 6 : 34051 - 34074
  • [45] Multi-authority proxy re-encryption based on CPABE for cloud storage systems
    Xu, Xiaolong
    Zhou, Jinglan
    Wang, Xinheng
    Zhang, Yun
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2016, 27 (01) : 211 - 223
  • [46] Multi-authority proxy re-encryption based on CPABE for cloud storage systems
    Xiaolong Xu
    Jinglan Zhou
    Xinheng Wang
    Yun Zhang
    [J]. Journal of Systems Engineering and Electronics, 2016, 27 (01) : 211 - 223
  • [47] Revocable, Decentralized Multi-authority Access Control System
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    [J]. 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING COMPANION (UCC COMPANION), 2018, : 220 - 225
  • [48] Multi-authority Attribute Based Encryption Scheme with Revocation
    Huang, XiaoFang
    Tao, Qi
    Qin, BaoDong
    Liu, ZhiQin
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [49] Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage
    Fan Yundong
    Wu Xiaoping
    Wang Jiasheng
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 205 - 212
  • [50] SDSS-MAC: Secure data sharing scheme in multi-authority cloud storage systems
    Jiang, Rui
    Wu, Xianglong
    Bhargava, Bharat
    [J]. COMPUTERS & SECURITY, 2016, 62 : 193 - 212