Hierarchical Access Control with Scalable Data Sharing in Cloud Storage

被引:4
|
作者
Qiu, Zhenyao [1 ]
Zhang, Zhiwei [1 ]
Tan, Shichong [1 ]
Wang, Jianfeng [1 ]
Tao, Xiaoling [2 ,3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Shaanxi, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Cooperat Innovat Ctr Cloud Comp & Big Dat, Guilin, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Coll & Univ Key Lab Cloud Comp & Complex, Guilin, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2019年 / 20卷 / 03期
基金
中国国家自然科学基金;
关键词
Access control; Hierarchical key assignment; Data sharing; Cloud storage; Key-aggregate encryption; ATTRIBUTE-BASED ENCRYPTION; OUTSOURCED DATABASE; SECURE; SEARCH;
D O I
10.3966/160792642019052003002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage is facing the contradiction between data security and flexible data sharing, and therefore the cryptographic access control mechanisms are well studied. In particular, hierarchical access control in cloud storage is significant for many application scenarios. In these scenarios, the users are divided into several groups organized in a hierarchy, and they are assigned with different access privileges according to their groups and levels. That is, the users in higher level groups can access the data belonging to their subordinate groups while the users in lower level groups cannot access the data belonging to their superior groups. However, most of the existing hierarchical access control solutions seem to be unpractical for their inability of scalable data sharing, inefficiency of key management or lack of delegated reencryption. In this paper, we propose a new hierarchical access control scheme based on key-aggregate encryption, and the proposed scheme realizes scalable data sharing in cloud storage which allows the users to share data with any user group. In the proposed scheme, the size of each key or ciphertext is constant and irrelevant to the scale of hierarchical user structure. Especially, our scheme improves the convenience of key management by cutting off the key derivation widely used in the existing hierarchical key assignment methods. Furthermore, the proposed scheme reduces the users' updating overhead by introducing the delegated re-encryption into the hierarchical scenarios. Finally, the security analysis and the performance evaluation indicate that our scheme is feasible for the hierarchical data sharing applications in cloud storage.
引用
收藏
页码:663 / 676
页数:14
相关论文
共 50 条
  • [21] Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    Guo, Minyi
    COMPUTERS & SECURITY, 2011, 30 (05) : 320 - 331
  • [22] Secure data sharing with confidentiality, integrity and access control in cloud environment
    Rajkumar V.
    Prakash M.
    Vennila V.
    Computer Systems Science and Engineering, 2021, 40 (02): : 779 - 793
  • [23] Oblivious access control policies for cloud based data sharing systems
    Zeeshan Pervez
    Asad Masood Khattak
    Sungyoung Lee
    Young-Koo Lee
    Eui-Nam Huh
    Computing, 2012, 94 : 915 - 938
  • [24] Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment
    Rajkumar, V
    Prakash, M.
    Vennila, V.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (02): : 779 - 793
  • [25] Oblivious access control policies for cloud based data sharing systems
    Pervez, Zeeshan
    Khattak, Asad Masood
    Lee, Sungyoung
    Lee, Young-Koo
    Huh, Eui-Nam
    COMPUTING, 2012, 94 (12) : 915 - 938
  • [26] Privacy Aware Access Control for Data Sharing in Cloud Computing Environments
    Takabi, Hassan
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 27 - 34
  • [27] On the Security of Data Access Control for Multiauthority Cloud Storage Systems
    Wu, Xianglong
    Jiang, Rui
    Bhargava, Bharat
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (02) : 258 - 272
  • [28] Efficient decentralized access control for secure data sharing in cloud computing
    Liu, Tonglai
    Wu, Jigang
    Li, Jiaxing
    Li, Jingyi
    Li, Yidong
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (17):
  • [29] Revocable, dynamic and decentralized data access control in cloud storage
    Wang, Chong
    Jin, Hao
    Wei, Ronglei
    Zhou, Ke
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (07): : 10063 - 10087
  • [30] Revocable, dynamic and decentralized data access control in cloud storage
    Chong Wang
    Hao Jin
    Ronglei Wei
    Ke Zhou
    The Journal of Supercomputing, 2022, 78 : 10063 - 10087