Efficient Revocation for Multi-Authority Cloud Storage Systems
|
International Journal of Computer & Organization Trends (IJCOT) | |
© 2017 by IJCOT Journal | ||
Volume - 7 Issue - 3 |
||
Year of Publication : 2017 | ||
Authors : Noor U Sabha, Sriraksha T A, Shivaraj Kumar T H |
Citation
Noor U Sabha, Sriraksha T A, Shivaraj Kumar T H "Efficient Revocation for Multi-Authority Cloud Storage Systems", International Journal of Computer & organization Trends (IJCOT), V7(3):13-15 May - Jun 2017, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.
Abstract
Due to the high volume and velocity of big data, it is an effective option to store big data in the cloud, as the cloud has capabilities of storing big data and processing high volume of user access requests. Attribute-Based Encryption (ABE) is a promising technique to ensure the end-to-end security of big data in the cloud. However, the policy updating has always been a challenging issue when ABE is used to construct access control schemes. A trivial implementation is to let data owners retrieve the data and re-encrypt it under the new access policy, and then send it back to the cloud. This method, however, incurs a high communication overhead and heavy computation burden on data owners. A novel scheme is proposed that enable efficient access control with dynamic policy updating for big data in the cloud. Developing an outsourced policy updating method for ABE systems is focused. This method can avoid the transmission of encrypted data and minimize the computation work of data owners, by making use of the previously encrypted data with old access policies. Policy updating algorithms is proposed for different types of access policies. An efficient and secure method is proposed that allows data owner to check whether the cloud server has updated the ciphertexts correctly.
References
[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A.
Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and Z.
Matei. A view of cloud computing. Communications of the ACM,
53(4):50–58, 2010.
[2] K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie. DAC-MACS:
Effective data access control for multi-authority cloud storage
systems. IEEE Transactions on Information Forensics & Security,
8(11):2895–2903,
2013.
[3] X. Chen, J. Li, X. Huang, J. Ma, and W. Lou. New publicly
verifiable databases with efficient updates. IEEE Transactions on
Dependable and Secure Computing, 12(5):546–556, 2015.
[4] K. Ren, C. Wang, and Q. Wang. Security challenges for the
public cloud. IEEE Internet Computing, 16(1):69–73, 2012.
[5] S. Subashiniand V. Kavitha. A survey on security issues in
service delivery models of cloud computing. Journal of Network
and Computer Applications, 34(1):1 – 11, 2011.
[6] S. Kamara and K. Lauter. Cryptographic cloud storage. In
Proceedings of the 1st Workshop on Real-Life Cryptographic
Protocols and Standardization(RLCPS’2010), volume 6054 of
Lecture Notes in Computer Science, pages 136–149, Berlin,
Heidelberg, 2010. Springer-Verlag.
[7] X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou. New algorithms
for secure outsourcing of modular exponentiations. IEEE
Transactions on Parallel and Distributed Systems, 25(9):2386–
2396, 2014.
[8] D. Boneh and M. Franklin. Identity-based encryption from the
weil pairing. In Advances in Cryptology-CRYPTO’2001, volume
2139 of Lecture Notes in Computer Science, pages 213–229,
Berlin, Heidelberg, 2001. Springer-Verlag.
[9] A. Sahai and B. Waters. Fuzzy identity-based encryption. In
Advances in Cryptology-EUROCRYPT’2005, volume 3494 of
Lecture Notes in Computer Science, pages 457–473. Springer
Heidelberg, 2005.
[10] V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attributebased
encryption for fine-grained access control of encrypted data.
In Proceedings of the 13th ACM Conference on Computer and
Communications Security(CCS’2006), pages 89–98. ACM, 30
October - 3 November 2006.
[11] J. Hur and D. K. Noh.Attribute-based access control with
efficient revocation in data outsourcing systems. IEEE
Transactions on Parallel and Distributed Systems, 22(7):1214–
1221, 2011.
[12] J. Lai, R. H. Deng, C. Guan, and J. Weng. Attribute-based
encryption with verifiable outsourced decryption. IEEE
Transactions on Information Forensics and Security, 8(8):1343–
1354, 2013.
[13] K. Yang, X. Jia, and K. Ren. Attribute-based fine-grained
access control with efficient revocation in cloud storage systems.
In Proceedings of the 8th ACM SIGSAC Symposium on
Information, Computer and Communications
Security(ASIACCS’2013), pages 523–528, New York, NY, USA,
2013. ACM.
[14] S. Yu, C. Wang, K. Ren, and W. Lou. Attribute based data
sharing with attribute revocation. In Proceedings of the 5th ACM
Symposium on Information, Computer and Communications
Security(ASIACCS’2010),pages 261–270, New York, NY, USA,
2010. ACM.
[15] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy
attribute based encryption. In Proceedings of the 2007 IEEE
Symposium on Security and Privacy(S&P’2007), pages 321–334.
IEEE, 20-23 May 2007.
Keywords
Attribute-based encryption; multiauthority
cloud storage; attribute-level revocation;
user-level revocation.