Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 3/2021

30-01-2021

A robust and secure multi-authority access control system for cloud storage

Authors: Jin Gu, Jianqiang Shen, Baoyun Wang

Published in: Peer-to-Peer Networking and Applications | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as an ideal technique for data access control in cloud storage platform. The traditional CP-ABE requires only one trusted authority to manage the whole attribute set and issue associated keys. However, it makes the only-one-authority become a high-risk entity of the system: When the authority is compromised or crashed, the system will break down. In this paper, we propose a robust multi-authority based CP-ABE scheme for cloud storage, in which multiple authorities jointly manage the whole attribute set. In our proposed scheme, attribute associated keys can be distributed if and only if the active authorities involved in the procedure exceed a specified threshold (t). We further prove that our proposed scheme is secure and robust, which can tolerate less than t authorities being compromised or no more than nt authorities being crashed, where n denotes the total number of authorities.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mansouri Y, Toosi AN, Buyya R (2017) Data storage management in cloud environments: Taxonomy, survey, and future directions. ACM Comput Surv 50(6):91 Mansouri Y, Toosi AN, Buyya R (2017) Data storage management in cloud environments: Taxonomy, survey, and future directions. ACM Comput Surv 50(6):91
2.
go back to reference Hong J, Xue K, Gai N, et al. (2020) Service outsourcing in F2C architecture with attribute-based anonymous access control and bounded service number. IEEE Trans Depend Secure Comput 17(5):1051–1062CrossRef Hong J, Xue K, Gai N, et al. (2020) Service outsourcing in F2C architecture with attribute-based anonymous access control and bounded service number. IEEE Trans Depend Secure Comput 17(5):1051–1062CrossRef
3.
go back to reference Mushtaq MF, Akram U, Khan I, Khan SN, Shahzad A, Ullah A (2017) Cloud computing environment and security challenges: A review. Int J Adv Comput Sci Appli 8(10) Mushtaq MF, Akram U, Khan I, Khan SN, Shahzad A, Ullah A (2017) Cloud computing environment and security challenges: A review. Int J Adv Comput Sci Appli 8(10)
4.
go back to reference Yu T, Winslett M (2003) A unified scheme for resource protection in automated trust negotiation. In: Proceedings of the 24th IEEE symposium on security and privacy(S&P’03). IEEE, pp 110–122 Yu T, Winslett M (2003) A unified scheme for resource protection in automated trust negotiation. In: Proceedings of the 24th IEEE symposium on security and privacy(S&P’03). IEEE, pp 110–122
5.
go back to reference Harney H, Colgrove A, McDaniel P (2001) Principles of policy in secure groups. In: Proceedings of the 18th network & distributed system security symposium(NDSS2011). Internet society, pp 125–135 Harney H, Colgrove A, McDaniel P (2001) Principles of policy in secure groups. In: Proceedings of the 18th network & distributed system security symposium(NDSS2011). Internet society, pp 125–135
6.
go back to reference Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Futur Gener Comput Syst 28(3):583–592CrossRef Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Futur Gener Comput Syst 28(3):583–592CrossRef
7.
go back to reference Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceedings of the 24th annual international conference on the theory and applications of cryptographic techniques(Eurocrypt2005). Springer, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceedings of the 24th annual international conference on the theory and applications of cryptographic techniques(Eurocrypt2005). Springer, pp 457–473
8.
go back to reference Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of the 29th annual international conference on the theory and applications of cryptographic techniques(Eurocrypt2013). Springer, pp 62–91 Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of the 29th annual international conference on the theory and applications of cryptographic techniques(Eurocrypt2013). Springer, pp 62–91
9.
go back to reference Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security(CCS07). ACM, pp 195–203 Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security(CCS07). ACM, pp 195–203
10.
go back to reference Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security(CCS2006). ACM, pp 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security(CCS2006). ACM, pp 89–98
11.
go back to reference Attrapadung N, Libert B, Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Proceedings of the 14th IACR international conference on practice and theory in public key cryptography(PKC2011). Springer, pp 90–108 Attrapadung N, Libert B, Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Proceedings of the 14th IACR international conference on practice and theory in public key cryptography(PKC2011). Springer, pp 90–108
12.
go back to reference Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Proceedings of the 14th international conference on practice and theory in public key cryptography(PKC2011). Springer, pp 53–70 Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Proceedings of the 14th international conference on practice and theory in public key cryptography(PKC2011). Springer, pp 53–70
13.
go back to reference Gudeme JR, Pasupuleti SK, Kandukuri R (2020) Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage. J Ambient Intell Human Comput (2) Gudeme JR, Pasupuleti SK, Kandukuri R (2020) Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage. J Ambient Intell Human Comput (2)
14.
go back to reference Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th IEEE international conference on computer communications(INFOCOM2010). IEEE, pp 1–9 Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th IEEE international conference on computer communications(INFOCOM2010). IEEE, pp 1–9
15.
go back to reference Zarandioon S, Yao D, Ganapathy V (2012) K2c: Cryptographic cloud storage with lazy revocation and anonymous access. In: Proceedings of the 8th international ICST conference on security and privacy in communication networks(secureCOMM2012). Springer, pp 59–76 Zarandioon S, Yao D, Ganapathy V (2012) K2c: Cryptographic cloud storage with lazy revocation and anonymous access. In: Proceedings of the 8th international ICST conference on security and privacy in communication networks(secureCOMM2012). Springer, pp 59–76
16.
go back to reference Xue K, Hong J, Xue Y, et al. (2017) CABE: A new comparable attribute-based encryption construction with 0-encoding and 1-encoding. IEEE Trans Comput 66(9):1491–1503MathSciNetCrossRef Xue K, Hong J, Xue Y, et al. (2017) CABE: A new comparable attribute-based encryption construction with 0-encoding and 1-encoding. IEEE Trans Comput 66(9):1491–1503MathSciNetCrossRef
17.
go back to reference Xue Y, Xue K, Gai N, et al. (2019) An attribute-based controlled collaborative access control scheme for public cloud storage. IEEE Trans Inform Forens Secur 14(11):2927–2942CrossRef Xue Y, Xue K, Gai N, et al. (2019) An attribute-based controlled collaborative access control scheme for public cloud storage. IEEE Trans Inform Forens Secur 14(11):2927–2942CrossRef
18.
go back to reference Yao X, Lin Y, Liu Q, Zhang J (2018) Privacy-preserving search over encryted personal health record in multi-source cloud. IEEE Access 6:3809–3823CrossRef Yao X, Lin Y, Liu Q, Zhang J (2018) Privacy-preserving search over encryted personal health record in multi-source cloud. IEEE Access 6:3809–3823CrossRef
19.
go back to reference Ahuja R, Mohanty SK (2020) A scalable attribute-based access control scheme with flexible delegation cum sharing of access privileges for cloud storage. IEEE Trans Cloud Comput 8(1):32–44CrossRef Ahuja R, Mohanty SK (2020) A scalable attribute-based access control scheme with flexible delegation cum sharing of access privileges for cloud storage. IEEE Trans Cloud Comput 8(1):32–44CrossRef
20.
go back to reference Xue K, Chen W, Li W, et al. (2018) Combining data owner-side and cloud-side access control for encrypted cloud storage. IEEE Trans Inform Forens Secur 13(8):2062–2074CrossRef Xue K, Chen W, Li W, et al. (2018) Combining data owner-side and cloud-side access control for encrypted cloud storage. IEEE Trans Inform Forens Secur 13(8):2062–2074CrossRef
21.
go back to reference Hong J, Xue K, Xue Y, et al. (2020) TAFC: Time And attribute factors combined access control for time-sensitive data in public cloud. IEEE Trans Serv Comput 13(1):158–171MathSciNetCrossRef Hong J, Xue K, Xue Y, et al. (2020) TAFC: Time And attribute factors combined access control for time-sensitive data in public cloud. IEEE Trans Serv Comput 13(1):158–171MathSciNetCrossRef
22.
go back to reference Shiraishi TNM (2015) Attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Human-centric Comput Inform Sci Shiraishi TNM (2015) Attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Human-centric Comput Inform Sci
23.
go back to reference Arfaoui A, Cherkaoui S, Kribeche A (2019) Senouci Context-aware adaptive authentication and authorization in internet of things. In: ICC 2019-2019 IEEE international conference and communications (ICC). IEEE Arfaoui A, Cherkaoui S, Kribeche A (2019) Senouci Context-aware adaptive authentication and authorization in internet of things. In: ICC 2019-2019 IEEE international conference and communications (ICC). IEEE
24.
go back to reference Yang K, Jia X, Ren K, Zhang B, Xie R (2013) DAC-MACS: Effective Data access control for multi-authority cloud storage systems. IEEE Trans Inform Forens Secur 8(11):1790–1801CrossRef Yang K, Jia X, Ren K, Zhang B, Xie R (2013) DAC-MACS: Effective Data access control for multi-authority cloud storage systems. IEEE Trans Inform Forens Secur 8(11):1790–1801CrossRef
25.
go back to reference Wan Z, Liu J, Deng RH (2012) HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inform Forens Secur 7(2):743–754CrossRef Wan Z, Liu J, Deng RH (2012) HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inform Forens Secur 7(2):743–754CrossRef
26.
go back to reference Jung T, Li X-Y, Wan Z, Wan M (2013) Privacy preserving cloud data access with multi-authorities. In: Proceedings of the 32nd IEEE international conference on computer communications(INFOCOM2013). IEEE, pp 2625–2633 Jung T, Li X-Y, Wan Z, Wan M (2013) Privacy preserving cloud data access with multi-authorities. In: Proceedings of the 32nd IEEE international conference on computer communications(INFOCOM2013). IEEE, pp 2625–2633
27.
go back to reference Li W, Xue K, Xue Y, Hong J (2016) TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Trans Parall Distribut Syst 27(5):1484–1496CrossRef Li W, Xue K, Xue Y, Hong J (2016) TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Trans Parall Distribut Syst 27(5):1484–1496CrossRef
28.
go back to reference Zhong H, Zhu W, Xu Y, Cui J (2016) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22:1–9, 09MATH Zhong H, Zhu W, Xu Y, Cui J (2016) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22:1–9, 09MATH
29.
go back to reference Xue K, Xue Y, Hong J, et al. (2017) RAAC: Robust and auditable access control with multiple attribute authorities for public cloud storage. IEEE Trans Inform Forens Secur 12(4):953–967CrossRef Xue K, Xue Y, Hong J, et al. (2017) RAAC: Robust and auditable access control with multiple attribute authorities for public cloud storage. IEEE Trans Inform Forens Secur 12(4):953–967CrossRef
31.
go back to reference Pedersen TP (1991) A threshold cryptosystem without a trusted party. In: Proceedings of the 10th annual international conference on the theory and applications of cryptographic techniques(Eurocrypt1991). Springer, pp 522–526 Pedersen TP (1991) A threshold cryptosystem without a trusted party. In: Proceedings of the 10th annual international conference on the theory and applications of cryptographic techniques(Eurocrypt1991). Springer, pp 522–526
33.
go back to reference Damgård I, Jurik M (2003) A length-flexible threshold cryptosystem with applications. In: Proceedings of the 8th Australasian conference on information security and privacy(ACISP’03). Springer, pp 350–364 Damgård I, Jurik M (2003) A length-flexible threshold cryptosystem with applications. In: Proceedings of the 8th Australasian conference on information security and privacy(ACISP’03). Springer, pp 350–364
34.
go back to reference Liu Z, Cao Z (2010) On efficiently transferring the linear secret-sharing scheme matrix in ciphertext-policy attribute-based encryption. IACR Cryptology ePrint Archive 2010:374 Liu Z, Cao Z (2010) On efficiently transferring the linear secret-sharing scheme matrix in ciphertext-policy attribute-based encryption. IACR Cryptology ePrint Archive 2010:374
Metadata
Title
A robust and secure multi-authority access control system for cloud storage
Authors
Jin Gu
Jianqiang Shen
Baoyun Wang
Publication date
30-01-2021
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 3/2021
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-01055-5

Other articles of this Issue 3/2021

Peer-to-Peer Networking and Applications 3/2021 Go to the issue

Premium Partner