DeepAI AI Chat
Log In Sign Up

vFAC: Fine-Grained Access Control with Versatility for Cloud Storage

by   Jingwei Liu, et al.
Xidian University

In recent years, cloud storage technology has been widely used in many fields such as education, business, medical and more because of its convenience and low cost. With the widespread applications of cloud storage technology, data access control methods become more and more important in cloud-based network. The ciphertext policy attribute-based encryption (CP-ABE) scheme is very suitable for access control of data in cloud storage. However, in many practical scenarios, all attributes of a user cannot be managed by one authority, so many multi-authority CP-ABE schemes have emerged. Moreover, cloud servers are usually semi-trusted, which may leak user information. Aiming at the above problems, we propose a fine-grained access control scheme with versatility for cloud storage based on multi-authority CP-ABE, named vFAC. The proposed vFAC has the features of large universe, no key escrow problem, online/offline mechanism, hidden policy, verifiability and user revocation. Finally, we demonstrate vFAC is static security under the random oracle model. Through the comparison of several existing schemes in terms of features, computational overhead and storage cost, we can draw a conclusion that vFAC is more comprehensive and scalable.


page 1

page 2

page 3

page 4

page 5

page 6


On the security of the hierarchical attribute based encryption scheme proposed by Wang et al

Ciphertext-policy hierarchical attribute-based encryption (CP-HABE) is a...

Cloud+: A safe and restrained data access control program for cloud

Secure distributed storage, which is a rising cloud administration, is p...

ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage

With the rapid development of general cloud services, more and more indi...

PML: An Interpreter-Based Access Control Policy Language for Web Services

Access control is an important component for web services such as a clou...

Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things

Unauthorized resource access represents a typical security threat in the...

A Secure Proxy-based Access Control Scheme for Implantable Medical Devices

With the rapid development of health equipments, increasingly more patie...

Blockchain-based RBAC Model with Separation of Duties constraint in Cloud Environment

In recent years, cloud computing has been developing rapidly and is wide...