Mix&slice for Efficient Access Revocation on Outsourced Data
نویسندگان
چکیده
A complex problem when outsourcing data to the cloud is access control management. Encryption, by wrapping with a self-enforcing protection layer, provides enforcement making resources intelligible only users holding necessary key. The real challenge becomes then efficient revocation of access. We address this and present an approach effectively efficiently enforce on stored at external providers. relies resource transformation that strong mutual inter-dependency in its encrypted representation. To revoke resource, it sufficient update small portion it, guarantee as whole (and any it) will become unintelligible those from whom revoked. Our experimental results show effectiveness our approach, confirm efficiency, especially managing large dynamic policy.
منابع مشابه
A Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملAn Efficient Access control scheme for Outsourced Data
In this paper, we analyze Liu et al.’s scheme and show that their scheme is not secure. Then we modify their scheme and present an efficient access scheme to outsourced data. Our scheme adopts two-layer encryption model and all users are divided into different groups according to their access privilege. We employ filter functions to construct the key derivation procedure to prevent the revoked ...
متن کاملEfficient Enforcement of Dynamic Access Control Policies for Outsourced Data
Outsourcing of their data to third-party service providers is a cost-effective data management strategy for many organizations. Outsourcing, however, introduces new challenges with respect to ensuring the security and the privacy of the data. In addition to the need for standard access control policies, organizations must now be concerned with the privacy of their data and so hiding the data fr...
متن کاملRevocation in Publicly Verifiable Outsourced Computation
The combination of software-as-a-service and the increasing use of mobile devices gives rise to a considerable difference in computational power between servers and clients. Thus, there is a desire for clients to outsource the evaluation of complex functions to an external server. Servers providing such a service may be rewarded per computation, and as such have an incentive to cheat by returni...
متن کاملEfficient Key Management for Enforcing Access Control in Outsourced Scenarios
Data outsourcing is emerging today as a successful paradigm allowing individuals and organizations to exploit external servers for storing and distributing data. While trusted to properly manage the data, external servers are often not authorized to read them, therefore requiring data to be encrypted. In such a context, the application of an access control policy requires different data to be e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2023
ISSN: ['1941-0018', '1545-5971', '2160-9209']
DOI: https://doi.org/10.1109/tdsc.2023.3280590