Computer Science ›› 2016, Vol. 43 ›› Issue (5): 122-126.doi: 10.11896/j.issn.1002-137X.2016.05.023

Previous Articles     Next Articles

Virtual Group Revocation Policy-based Cloud Storage Access Control Model

XIE Li-xia, BO Fu-kuan and ZHAO Bin-bin   

  • Online:2018-12-01 Published:2018-12-01

Abstract: To solve the problems that the existing cloud storage access control models have low efficiency of users’ privilege revocation and are unable to adapt to a large number of users,this paper proposed a new model on the basis of analysis of cipher-text policy attribute-based encryption.Virtual group revocation policy was given,all users were mapped to multiple virtual groups,and the access structure was rebuilt.The range of users’ privilege revocation was limited within a virtual group.By redistributing the users’ private key in the certain virtual group where revocation takes place,users’ privilege revocation can be achieved without any changes in the other virtual groups.Obviously,this approach greatly improves the efficiency of users’ privilege revocation.A simulation experiment was conducted in Apache Hadoop platform,and the experiment results demonstrate that this model has higher efficiency on users’ privilege revocation.

Key words: Cloud storage,Access control,Virtual group,Users’ privilege revocation

[1] Wu J,Fu J,Lin Z,et al.A survey on cloud storage [J].Journal of Computers,2011,6(8):1764-1771
[2] Elavarasi P,Parijatham R.Key updation for the dynamic attri-butes in cloud computing for competent user retraction [J].International Journal of Engineering Science and Technology,2013,5(06s):2278-9510
[3] Sahai A,Waters B.Fuzzy identity-based encryption[C]∥The 24th Annual International Conference on Theory and Applications of Cryptographic Techniques.Berlin:Springer,2005:457-473
[4] Goyal B,Pandey O,Sahai A,et al.Attribute based encryption for fine-grained access control of encrypted data[C]∥The 13th ACM Conference on Computer and Communications Security.New York:ACM Press,2006:89-98
[5] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[J].Journal of Network and Computer Applications,2010,33(2):76-83
[6] Waters B.Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization[C]∥The 14th International Conference on Practice and Theory in Public Key Cryptography.Berlin:Springer,2011,6571:53-70
[7] Zhang R,Chen P.A Dynamic Cryptographic Access Control Sch-eme in Cloud Storage Services [C]∥2012 8th International Conference on Computing and Networking Technology.Washington D C:IEEE CS Press,2012:50-55
[8] Pervez Z,Khattak A M,Lee S,et al.SAPDS:self-healing attri-bute-based privacy aware data sharing in cloud[J].The Journal of Supercomputing,2012,62(1):431-460
[9] Yang K,Jia X,Ren K.Attribute-based Fine-Grained AccessControl with Efficient Revocation in Cloud Storage Systems[C]∥The 8th ACM Symposium on Information,Computer and Communications Security.New York:ACM Press,2013:523-528
[10] Yu S,Wang S,Ren K,et al.Attribute based data sharing with attribute revocation[C]∥The 5th ACM Symposium on Information,Computer and Communications Security.New York:ACM Press,2010:261-270
[11] Su J S,Cao D,Wang X F,et al.Attribute-based encryption sch-emes[J].Journal of Software,2011,22(6):1299-1315(in Chinese) 苏金树,曹丹,王小峰,等.属性基加密机制[J].软件学报,2011,2(6):1299-1315
[12] GAS lab.Java Pairing Based Cryptography Library[EB/OL].(2013-12-01).http://gas.dia.unisa.it/projects/jpbc/contact.html

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!