中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 会议论文
Title:
a secure and efficient revocation scheme for fine-grained access control in cloud storage
Author: Lv Zhiquan ; Hong Cheng ; Zhang Min ; Feng Dengguo
Source: CloudCom 2012 - Proceedings: 2012 4th IEEE International Conference on Cloud Computing Technology and Science
Conference Name: 2012 4th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2012
Conference Date: December 3, 2012 - December 6, 2012
Issued Date: 2012
Conference Place: Taipei, Taiwan
Keyword: Cloud computing ; Digital storage
Indexed Type: EI
ISBN: 9781467345095
Department: (1) Institute of Software Chinese Academy of Sciences Beijing China
Sponsorship: Quanta Computer; MEDIATEK; Microsoft; Institute for Information Industry; Industrial Technology Research Institute (ITRI)
Abstract: To keep data confidential against unauthorized cloud servers and users, cryptographic access control mechanisms must be adopted. However, user revocation is a challenging issue since it would inevitably require data re-encryption, and may need user secret key updates. Considering the complexity of fine-grained access control policy and the large number of users in cloud, this issue would become extremely difficult to resolve. In this paper, we focus on this challenging open issue and present a secure and efficient revocation scheme. We propose a modified CP-ABE algorithm to set up a fine-grained access control method, in which user revocation is achieved based on the theory of Shamir's Secret Sharing. Compared with existing schemes, our scheme introduces a minimal overhead not only to the data owner but also to cloud servers. Collusions between cloud servers and revoked users can be avoided as long as the key-update protocol is honestly executed. Meanwhile, the data owner can delegate key updates to the cloud servers without disclosing data contents, user attributes, and the access policy information. Moreover, our scheme maintains the important feature that the revocation won't affect the users whose attribute set is a superset of the revoked user's. © 2012 IEEE.
English Abstract: To keep data confidential against unauthorized cloud servers and users, cryptographic access control mechanisms must be adopted. However, user revocation is a challenging issue since it would inevitably require data re-encryption, and may need user secret key updates. Considering the complexity of fine-grained access control policy and the large number of users in cloud, this issue would become extremely difficult to resolve. In this paper, we focus on this challenging open issue and present a secure and efficient revocation scheme. We propose a modified CP-ABE algorithm to set up a fine-grained access control method, in which user revocation is achieved based on the theory of Shamir's Secret Sharing. Compared with existing schemes, our scheme introduces a minimal overhead not only to the data owner but also to cloud servers. Collusions between cloud servers and revoked users can be avoided as long as the key-update protocol is honestly executed. Meanwhile, the data owner can delegate key updates to the cloud servers without disclosing data contents, user attributes, and the access policy information. Moreover, our scheme maintains the important feature that the revocation won't affect the users whose attribute set is a superset of the revoked user's. © 2012 IEEE.
Language: 英语
Content Type: 会议论文
URI: http://ir.iscas.ac.cn/handle/311060/15915
Appears in Collections:软件所图书馆_会议论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Lv Zhiquan,Hong Cheng,Zhang Min,et al. a secure and efficient revocation scheme for fine-grained access control in cloud storage[C]. 见:2012 4th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2012. Taipei, Taiwan. December 3, 2012 - December 6, 2012.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Lv Zhiquan]'s Articles
[Hong Cheng]'s Articles
[Zhang Min]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Lv Zhiquan]‘s Articles
[Hong Cheng]‘s Articles
[Zhang Min]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace