Computer Science ›› 2015, Vol. 42 ›› Issue (7): 210-215.doi: 10.11896/j.issn.1002-137X.2015.07.046

Previous Articles     Next Articles

Secure Model of Cloud Storage Supporting Attribute Revocation

ZHANG Bing-hong, ZHANG Chuan-rong, JIAO He-ping and ZHANG Xin-wei   

  • Online:2018-11-14 Published:2018-11-14

Abstract: To solve the problem of coarse-grained attribute revocation for data users and huge computation for key distribution in the existing cloud storage model,we proposed a new secure model of cloud storage supporting fine-grained attribute revocation over the composite order bilinear groups.Data owner is also the attribute distributing authority,assuring the absolute control of the data in the cloud,which ensures that the data stored in open environment is secure on condition that the cloud service provider is unbelievable.We studied the model in two aspects,the frame of the model and the key distribution.The strict mathematical proofs of the model show that the scheme is adaptively secure.Based on the model,data access strategy is flexible and diverse,therefore it is suitable for open environment like cloud storage.

Key words: Attribute-based encryption,Dual-system encryption,Cloud storage,Attribute revocation,Adaptive security

[1] 傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述[J].计算机研究与发展,2013,0(1):136-145 Fu Ying-xun,Luo Sheng-mei,Shu Ji-wu.Survey of Secure Cloud Storage System and Key Technologies[J].Journal of Computer Research and Development,2013,0(1):136-145
[2] Sahai A,Waters B.Fuzzy identity-based encryption[C]∥Cramer R,ed.Advances in Cryptology-EUROCRYTP 2005:24th Annual International Conference on the Tehroy and Applications of Cryptographic Techniques.Springer Berlin Heidelberg,2005:457-473
[3] 苏金树,曹丹,王小峰,等.属性基加密机制[J].软件学报,2011,2(6):1299-1315 Su Jin-shu,Cao Dan,Wang Xiao-feng,et al.Attribute-Based Encryption Schemes[J].Journal of Software,2011,2(6):1299-1315
[4] Goyal V,Pandey O,Sahai A,et al.Attribute based encryption for fine-grained access control of encrypted data[C]∥Procee-dings of the 13th ACM Conference on Computer and Communications Security.Alexandria,Virginia,USA,2006:89-98
[5] Lin Huang,Cao Zhen-fu,Liang Xiao-hui,et al.Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority[J].Information Sciences,2010,0(13):2618-2632
[6] Chase M.Multi-authority attribute based encryption[C]∥Theo-ry of Cryptography:Proceedings of 4th Theory of Cryptography Conference.Springer Berlin Heidelberg,2007:515-534
[7] Müller S,Katzenbeisser S,Eckert C.Distributed attributed-based encryption[M]∥Information Security and Cryptology(ICISC 2008).Springer Berlin Heidelberg,2009:20-36
[8] Lewko A,Okamoto T,Sahai A,et al.Fully Secure Functional Encryption:Attribute-Based Encryption and (Hierarchical) Inner Product Encryption[C]∥Advances in Cryptology-EUROCRYPT 2010:Proceedings of 29th Annual International Confe-rence on the Theory and Applications of Cryptographic Techniques.Springer,2010:62-91
[9] Waters B.Dual System Encryption:Realizing Fully Secure IBE and HIBE under Simple Assumptions[C]∥Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology.Springer-Verlag,2009:619-636
[10] 王鹏翩,冯登国,张立武.一种支持完全细粒度属性撤销的CP-ABE方案[J].软件学报,2012,3(10):2805-2816 Wang Peng-pian,Feng Deng-guo,Zhang Li-wu.CP-ABE Scheme Supporting Fully Fine-Grained Attribute Revocation[J].Journal of Software,2012,3(10):2805-2816
[11] Beimel A.Secure schemes for secret sharing and key distribution [D].Haifa:Israel Institute of Technology,1996
[12] Boneh D,Goh E J,Nissim K.Evaluating 2-DNF formulas on ciphertexts[C]∥Proceedings of the Second International Confe-rence on Theory of Cryptography.Springer-Verlag,2005:325-341
[13] Gentry C,Waters B.Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)[C]∥Advances in Cryptology-EUROCRYPT 2009:Proceedings of 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Springer,2009:171-188
[14] Minowa T,Takahashi T.Secure distributed storage for bulk data[C]∥Neural Information Processing:Proceedings of 19th International Conference(ICONIP 2012).Springer Berlin Heidelberg,2012:566-575
[15] 吴胜艳,许力,林昌露.基于门限属性加密的安全分布式云存储模型[J].计算机应用,2013,3(7):1880-1884 Wu Sheng-yan,Xu Li,Lin Chang-lu.Secure and distributed cloud storage model from threshold attribute-based encryption[J].Journal of Computer Applications,2013,3(7):1880-1884

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!