vFAC: Fine-Grained Access Control with Versatility for Cloud Storage

11/08/2018
by   Jingwei Liu, et al.
0

In recent years, cloud storage technology has been widely used in many fields such as education, business, medical and more because of its convenience and low cost. With the widespread applications of cloud storage technology, data access control methods become more and more important in cloud-based network. The ciphertext policy attribute-based encryption (CP-ABE) scheme is very suitable for access control of data in cloud storage. However, in many practical scenarios, all attributes of a user cannot be managed by one authority, so many multi-authority CP-ABE schemes have emerged. Moreover, cloud servers are usually semi-trusted, which may leak user information. Aiming at the above problems, we propose a fine-grained access control scheme with versatility for cloud storage based on multi-authority CP-ABE, named vFAC. The proposed vFAC has the features of large universe, no key escrow problem, online/offline mechanism, hidden policy, verifiability and user revocation. Finally, we demonstrate vFAC is static security under the random oracle model. Through the comparison of several existing schemes in terms of features, computational overhead and storage cost, we can draw a conclusion that vFAC is more comprehensive and scalable.

READ FULL TEXT

page 1

page 2

page 3

page 4

page 5

page 6

research
10/13/2018

On the security of the hierarchical attribute based encryption scheme proposed by Wang et al

Ciphertext-policy hierarchical attribute-based encryption (CP-HABE) is a...
research
04/30/2020

Cloud+: A safe and restrained data access control program for cloud

Secure distributed storage, which is a rising cloud administration, is p...
research
05/03/2022

ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage

With the rapid development of general cloud services, more and more indi...
research
03/23/2019

PML: An Interpreter-Based Access Control Policy Language for Web Services

Access control is an important component for web services such as a clou...
research
03/06/2021

Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things

Unauthorized resource access represents a typical security threat in the...
research
03/01/2022

Blockchain-based RBAC Model with Separation of Duties constraint in Cloud Environment

In recent years, cloud computing has been developing rapidly and is wide...
research
03/21/2018

A Secure Proxy-based Access Control Scheme for Implantable Medical Devices

With the rapid development of health equipments, increasingly more patie...

Please sign up or login with your details

Forgot password? Click here to reset