A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage

被引:1
|
作者
Liu, Zechao [1 ]
Jiang, Zoe L. [1 ]
Wang, Xuan [1 ]
Yiu, S. M. [2 ]
Zhang, Ruoqing [2 ]
Wu, Yulin [1 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] Univ Hong Kong, Hong Kong, Peoples R China
关键词
Attribute-Based Encryption; Cloud Storage; Access Control; Temporal Constraint; Spatial Constraint;
D O I
10.1109/TrustCom/BigDataSE.2018.00092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage service allows data owners to store their (encrypted) data in a remote and may be untrusted cloud server. Attribute-Based Encryption (ABE) provides an excellent and flexible solution for data access control. As more and more applications evolved, ABE schemes may not handle all scenarios, in particular, if the access control has a time and location constraint. Time and location attributes are not as static as other general attributes. Existing ABE schemes cannot efficiently handle the continuous range of an attribute making it impractical for temporal and spatial constraints that are changing dynamically. In this paper, we propose a novel temporal and spatial constrained attribute-based access control (TSC-ABAC) scheme to solve this problem. Our system adopts a redesigned access structure and makes use of multi-dimensional range derivation function to match the time domain. This is the first ABE scheme that can efficiently handle time and location elements simultaneously. We further propose an extended TSC-ABAC scheme, which aims at reducing the decryption cost imposed on user. A thorough security and performance analysis shows that our design is secure and efficient. The result of our work could provide a feasible and practical data access control scheme for cloud storage services.
引用
收藏
页码:614 / 623
页数:10
相关论文
共 50 条
  • [41] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    ACM COMPUTING SURVEYS, 2020, 53 (04)
  • [42] Attribute-Based Access Control Scheme in Federated IoT Platforms
    Sciancalepore, Savio
    Pilc, Michal
    Schroeder, Svenja
    Bianchi, Giuseppe
    Boggia, Gennaro
    Pawlowski, Marek
    Piro, Giuseppe
    Plociennik, Marcin
    Weisgrab, Hannes
    INTEROPERABILITY AND OPEN-SOURCE SOLUTIONS FOR THE INTERNET OF THINGS (INTEROSS-IOT 2016), 2017, 10218 : 123 - 138
  • [43] Attribute-Based Solution with Time Restriction Delegate for Flexible and Scalable Access Control in Cloud Storage
    Wang Shoukun
    Wu Kaigui
    Wu Changze
    2016 IEEE/ACM 9TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2016, : 392 - 397
  • [44] A Privacy-Preserving Attribute-Based Access Control Scheme
    Xu, Yang
    Zeng, Quanrun
    Wang, Guojun
    Zhang, Cheng
    Ren, Ju
    Zhang, Yaoxue
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 361 - 370
  • [45] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2015, 48 (02) : 85 - 88
  • [46] Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage
    Fan Yundong
    Wu Xiaoping
    Wang Jiasheng
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 205 - 212
  • [47] Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage
    Challagidad, Praveen S.
    Birje, Mahantesh N.
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 840 - 849
  • [48] Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS
    Jasleen Kaur
    Rinkle Rani
    Nidhi Kalra
    Cluster Computing, 2024, 27 : 1047 - 1061
  • [49] Description Logic modeling of temporal Attribute-Based Access Control
    Peng Jin
    Yang Fang-chun
    2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS, 2006, : 414 - +
  • [50] Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS
    Kaur, Jasleen
    Rani, Rinkle
    Kalra, Nidhi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (01): : 1047 - 1061