Computer Science ›› 2013, Vol. 40 ›› Issue (8): 38-42.

Previous Articles     Next Articles

SKP-ABE Based Access Control Method in Cloud Storage

LIU Hong,LI Xie-hua and YANG Bo   

  • Online:2018-11-16 Published:2018-11-16

Abstract: For protection of data in cloud storage server,this paper proposed a simple KP-ABE to make the access control more flexible and efficient.An efficient access control scheme was proposed for transferring some of the re-encryption and key module to cloud storage server so that the computational expenses will be reduced dramatically.Moreover,this paper used the strategy of revoke minimum influence attribute,which will only influence limited attributes and make attribute revocation easily.

Key words: Cloud storage,SKP-ABE,EACS,RMIA,User revocation

[1] Cachin C,Keidar I,Shraer A.Trusting the cloud [J].ACM SIGACT News,2009,40(2):81-86
[2] Sahai A,Waters B.Fuzzy identity based encryption[C]∥Pro-ceedings of the Advances in Cryptology(EUROCRYPT).Aarhus,Denmark,Berlin,Heidelberg:Springer-Verlag,2005:457-473
[3] Goyal V,Pandey O,Sahai A,et al.Attribute based encryption for fine-grained access control of encrypted data[C]∥Procee-dings of the 13th ACM Conference on Computer and Communications Security(CCS ’06).New York,NY,USA:ACM,2006:89-98
[4] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]∥Proceedings of the 2007IEEE Sympo-sium on Security and Privacy.Oakland,California,USA,Wa-shington,DC,USA:IEEE Computer Society,2007:321-334
[5] Yu S,Wang C,Ren K,et al.Attribute based data sharing with attribute revocation[C]∥Proceedings of the 5th International Symposium on Information,Computer and Communications Security(ASIACCS 2010).New York,NY,USA:ACM,2010:261-270
[6] Yu S,Wang C,Ren K,et al.Achieving secure,scalable,and fine-grained data access control in cloud computing [A]∥Procee-dings of IEEE INFOCOM 2010[C].San Diego,CA,2010
[7] 洪澄,张敏,冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展,2010,47(增刊):259-265
[8] 吕志泉,张敏,冯登国.云存储密文访问控制方案[J].计算机科学与探索,2011(09)
[9] 洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方案[J].通信学报,2011(07)
[10] Blaze M,Bleumer G,Strauss M.Divertible protocols and atomic proxy cryptography[C]∥Proc.of EUROCRYPT ’98.1998

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!