Mix&slice for Efficient Access Revocation on Outsourced Data

نویسندگان

چکیده

A complex problem when outsourcing data to the cloud is access control management. Encryption, by wrapping with a self-enforcing protection layer, provides enforcement making resources intelligible only users holding necessary key. The real challenge becomes then efficient revocation of access. We address this and present an approach effectively efficiently enforce on stored at external providers. relies resource transformation that strong mutual inter-dependency in its encrypted representation. To revoke resource, it sufficient update small portion it, guarantee as whole (and any it) will become unintelligible those from whom revoked. Our experimental results show effectiveness our approach, confirm efficiency, especially managing large dynamic policy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Method for Protecting Access Pattern in Outsourced Data

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

متن کامل

An Efficient Access control scheme for Outsourced Data

In this paper, we analyze Liu et al.’s scheme and show that their scheme is not secure. Then we modify their scheme and present an efficient access scheme to outsourced data. Our scheme adopts two-layer encryption model and all users are divided into different groups according to their access privilege. We employ filter functions to construct the key derivation procedure to prevent the revoked ...

متن کامل

Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data

Outsourcing of their data to third-party service providers is a cost-effective data management strategy for many organizations. Outsourcing, however, introduces new challenges with respect to ensuring the security and the privacy of the data. In addition to the need for standard access control policies, organizations must now be concerned with the privacy of their data and so hiding the data fr...

متن کامل

Revocation in Publicly Verifiable Outsourced Computation

The combination of software-as-a-service and the increasing use of mobile devices gives rise to a considerable difference in computational power between servers and clients. Thus, there is a desire for clients to outsource the evaluation of complex functions to an external server. Servers providing such a service may be rewarded per computation, and as such have an incentive to cheat by returni...

متن کامل

Efficient Key Management for Enforcing Access Control in Outsourced Scenarios

Data outsourcing is emerging today as a successful paradigm allowing individuals and organizations to exploit external servers for storing and distributing data. While trusted to properly manage the data, external servers are often not authorized to read them, therefore requiring data to be encrypted. In such a context, the application of an access control policy requires different data to be e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2023

ISSN: ['1941-0018', '1545-5971', '2160-9209']

DOI: https://doi.org/10.1109/tdsc.2023.3280590