Achieving Scalable and Optimized Attribute Revocation in Cloud Computing
نویسندگان
چکیده
Revocation is one of the major problems for access control systems. Especially, the revocation cost for the data outsourced in the third party environment such as cloud storage systems. The revocation in the cloud-based access control typically deals with the cryptographic operations that introduce costly overheads for key re-generation, file reencryption, and key re-distribution. Also, the communication for retrieving files for re-encryption and loading them back to the cloud is another nontrivial cost for data owners. In this paper, we propose a Very Lightweight Proxy Re-Encryption (VL-PRE) scheme to efficiently support attributebased revocation and policy update in the collaborative data sharing in cloud computing environment. To this end, we propose three-phase VLPRE protocol including re-encryption key generation, re-encryption key update, and re-encryption key renewal for supporting the optimized attribute revocation and policy update. Finally, we conduct the experiments to evaluate the performance of our VL-PRE and show that it exhibits less computation cost with higher scalability in comparison with existing PRE schemes. key words: revocation, data access control, policy update, proxy reencryption
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملData Replication-Based Scheduling in Cloud Computing Environment
Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...
متن کاملExtended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data
Attribute-based encryption has the potential to be deployed in a cloud computing environment to provide scalable and fine-grained data sharing. However, user revocation within ABE deployment remains a challenging issue to overcome, particularly when there is a large number of users. In this work, we introduce an extended proxy-assisted approach, which weakens the trust required of the cloud ser...
متن کاملAttribute-Based Encryption: An Efficient Way to Secure Cloud Storage
Cloud computing is an emerging computing paradigm that enables users to remotely store their data on a cloud so as to enjoy scalable services on-demand. It has been found that maintaining the privacy of data from an unauthorized user is really a major challenge. This is a major concern as such data is outsourced to keep storage at third parties say cloud service providers. It is very much essen...
متن کاملAchieving Fine-grained Access Control and Integrity Auditing in Cloud Storage ⋆
Attributes based encryption (ABE) can achieve flexible and scalable access control and gurantee the confidentiality of the data stored in the cloud. However, important issues such as efficient user revocation and fine-grained access control are not straightforward, which constrain the adoption of ABE in cloud storage systems.Our proposed scheme realizes fine-grained read and write access contro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEICE Transactions
دوره 100-D شماره
صفحات -
تاریخ انتشار 2017