A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage

被引:1
|
作者
Liu, Zechao [1 ]
Jiang, Zoe L. [1 ]
Wang, Xuan [1 ]
Yiu, S. M. [2 ]
Zhang, Ruoqing [2 ]
Wu, Yulin [1 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] Univ Hong Kong, Hong Kong, Peoples R China
关键词
Attribute-Based Encryption; Cloud Storage; Access Control; Temporal Constraint; Spatial Constraint;
D O I
10.1109/TrustCom/BigDataSE.2018.00092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage service allows data owners to store their (encrypted) data in a remote and may be untrusted cloud server. Attribute-Based Encryption (ABE) provides an excellent and flexible solution for data access control. As more and more applications evolved, ABE schemes may not handle all scenarios, in particular, if the access control has a time and location constraint. Time and location attributes are not as static as other general attributes. Existing ABE schemes cannot efficiently handle the continuous range of an attribute making it impractical for temporal and spatial constraints that are changing dynamically. In this paper, we propose a novel temporal and spatial constrained attribute-based access control (TSC-ABAC) scheme to solve this problem. Our system adopts a redesigned access structure and makes use of multi-dimensional range derivation function to match the time domain. This is the first ABE scheme that can efficiently handle time and location elements simultaneously. We further propose an extended TSC-ABAC scheme, which aims at reducing the decryption cost imposed on user. A thorough security and performance analysis shows that our design is secure and efficient. The result of our work could provide a feasible and practical data access control scheme for cloud storage services.
引用
收藏
页码:614 / 623
页数:10
相关论文
共 50 条
  • [21] Auditable attribute-based data access control using blockchain in cloud storage
    V. Ezhil Arasi
    K. Indra Gandhi
    K. Kulothungan
    The Journal of Supercomputing, 2022, 78 : 10772 - 10798
  • [22] Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment
    Yan, Liang
    Ge, Lina
    Wang, Zhe
    Zhang, Guifen
    Xu, Jingya
    Hu, Zheng
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [23] Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment
    Liang Yan
    Lina Ge
    Zhe Wang
    Guifen Zhang
    Jingya Xu
    Zheng Hu
    Journal of Cloud Computing, 12
  • [24] Auditable attribute-based data access control using blockchain in cloud storage
    Arasi, V. Ezhil
    Gandhi, K. Indra
    Kulothungan, K.
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (08): : 10772 - 10798
  • [25] Efficient Decentralized Attribute-based Access Control for Cloud Storage with User Revocation
    Chen, Jianwei
    Ma, Huadong
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3782 - 3787
  • [26] A survey of attribute-based access control with user revocation in cloud data storage
    Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [27] Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    IEEE ACCESS, 2018, 6 : 34051 - 34074
  • [28] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097
  • [29] A keyword searchable attribute-based encryption scheme with attribute update for cloud storage
    Wang, Shangping
    Ye, Jian
    Zhang, Yaling
    PLOS ONE, 2018, 13 (05):
  • [30] Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing
    Li, Jiguo
    Chen, Ningyu
    Zhang, Yichen
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) : 983 - 993