Privacy Protection Based Access Control Scheme in Cloud-Based Services

被引:0
|
作者
Fan, Kai [1 ]
Tian, Qiong [1 ]
Wang, Junxiong [1 ]
Li, Hui [1 ]
Yang, Yintang [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xidian Univ, Key Lab, Minist Educ Wide Band Gap Semicond Mat & Devices, Xian 710071, Peoples R China
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
access control; data sharing; privacy protection; cloud-based services;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection (PS-ACS). In the PS-ACS scheme, we divide users into private domain (PRD) and public domain (PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption (KAE) and the Improved Attribute-based Signature (IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption (CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.
引用
收藏
页码:61 / 71
页数:11
相关论文
共 50 条
  • [1] Privacy Protection based Access Control Scheme in Cloud-based Services
    Fan, Kai
    Tian, Qiong
    Huang, Nana
    Wang, Yue
    Li, Hui
    Yang, Yintang
    [J]. 2016 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2016,
  • [2] Privacy Protection Based Access Control Scheme in Cloud-Based Services
    Kai Fan
    Qiong Tian
    Junxiong Wang
    Hui Li
    Yintang Yang
    [J]. China Communications, 2017, 14 (01) : 61 - 71
  • [3] Privacy Aware Access Control for Cloud-Based Data Platforms
    McCarthy, Donal
    Malone, Paul
    Hange, Johannes
    Doyle, Kenny
    Robson, Eric
    Conway, Dylan
    Ivanov, Stepan
    Radziwonowicz, Lukasz
    Kleinfeld, Robert
    Michalareas, Theodoros
    Kastrinogiannis, Timotheos
    Stasinos, Nikos
    Lampathaki, Fenareti
    [J]. CYBER SECURITY AND PRIVACY, CSP INNOVATION FORUM 2015, 2015, 530 : 26 - 37
  • [4] A Cloud-Based Access Control Scheme with User Revocation and Attribute Update
    Zhang, Peng
    Chen, Zehong
    Liang, Kaitai
    Wang, Shulan
    Wang, Ting
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 525 - 540
  • [5] Research on Cloud-Based LBS and Location Privacy Protection
    Yan, Yan
    Wang, Wan Jun
    [J]. INDUSTRIAL ENGINEERING, MACHINE DESIGN AND AUTOMATION (IEMDA 2014) & COMPUTER SCIENCE AND APPLICATION (CCSA 2014), 2015, : 9 - 15
  • [6] A simplified deniable authentication scheme in cloud-based pay-TV system with privacy protection
    Zhu, Hongfeng
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (11)
  • [7] A Cloud-based Transcoding with Partial Content Protection Scheme
    Shah, Rizwan Ali
    Fazal, Laraib
    Asghar, Mamoona N.
    Fleury, Martin
    [J]. 2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 116 - 121
  • [8] Preserving user query privacy in cloud-based security services
    Chen, Yen-Chung
    Wu, Yu-Sung
    Tzeng, Wen-Guey
    [J]. JOURNAL OF COMPUTER SECURITY, 2014, 22 (06) : 997 - 1024
  • [9] Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol
    Fan, Kai
    Wang, Wei
    Wang, Yue
    Li, Hui
    Yang, Yintang
    [J]. 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [10] Cloud-Based Identity Attribute Service with Privacy Protection in Cyberspace
    Zou, Xiang
    Chen, Bing
    Jin, Bo
    [J]. 2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 1160 - 1164