Skip to main content
Top

2021 | OriginalPaper | Chapter

Tunable Access Control for Data Sharing in Cloud

Authors : S. Sabitha, M. S. Rajasree

Published in: Evolutionary Computing and Mobile Sustainable Networks

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Attribute-Based Encryption (ABE) suffers communication and computation overhead due to the linearly varying size of the ciphertext and the secret key, depending on the number of attributes in the access policy. This paper proposes a multilevel attribute-based access control scheme for secure data sharing in the cloud to reduce the overhead. It produces a constant size ciphertext and a compact secret key to efficiently utilize the storage space and reduce the communication cost. This method flexibly shares ciphertext classes among the randomly selected users with a specific set of attributes. All other ciphertext classes outside the set remain confidential. It allows dynamic data updates and provides access control of varying granularity, at user-level, at file-level, and attribute-level. Granularity levels can be chosen based on applications and user demands. This scheme tackles user revocation and attribute revocation problems, and prevents forward and backward secrecy issues. It allows the data owner to revoke a specific user or a group of users. It is very useful for secure data storage and sharing.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wang Guojun, Liu Qin, Jie Wu, Guo Minyi (2011) Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput Secur (Elsevier) 30:320–331CrossRef Wang Guojun, Liu Qin, Jie Wu, Guo Minyi (2011) Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput Secur (Elsevier) 30:320–331CrossRef
2.
go back to reference Wan Z, Liu J, Deng RH (2012) HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743–754 Wan Z, Liu J, Deng RH (2012) HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743–754
3.
go back to reference Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inform Sci 275:370–384MathSciNetCrossRef Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inform Sci 275:370–384MathSciNetCrossRef
4.
go back to reference Teng W, Yang G, Xiang Y, Zhang T, Wang D (2016) Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Trans Cloud Comput. (99):1 Teng W, Yang G, Xiang Y, Zhang T, Wang D (2016) Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Trans Cloud Comput. (99):1
5.
go back to reference Dong X, Yu J, Zhu Y, Chen Y, Luo Y, Li M (2015) Seco: secure and scalable data collaboration services in cloud computing. Comput Secur 50:91–105CrossRef Dong X, Yu J, Zhu Y, Chen Y, Luo Y, Li M (2015) Seco: secure and scalable data collaboration services in cloud computing. Comput Secur 50:91–105CrossRef
6.
go back to reference Huang Q, Yang Y, Shen M (2017) Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Future Gener Comput Syst 72:239–249CrossRef Huang Q, Yang Y, Shen M (2017) Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Future Gener Comput Syst 72:239–249CrossRef
7.
go back to reference Chu C-K, Chow SSM, Tzeng W-G, Zhou J, Deng RH (2014) Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Trans Parallel Distrib Syst 25(2):468–477 Chu C-K, Chow SSM, Tzeng W-G, Zhou J, Deng RH (2014) Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Trans Parallel Distrib Syst 25(2):468–477
8.
go back to reference Zuo C, Shao J, Liu JK, Wei G, Ling Y (2018) Fine-grained two-factor protection mechanism for data sharing in cloud storage. IEEE Trans Inf Forensics Secur 13(1):186–196 Zuo C, Shao J, Liu JK, Wei G, Ling Y (2018) Fine-grained two-factor protection mechanism for data sharing in cloud storage. IEEE Trans Inf Forensics Secur 13(1):186–196
9.
go back to reference Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221 Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221
10.
go back to reference Hur J (2013) Attribute-based secure data sharing with hidden policies in smart grid. IEEE Trans Parallel Distrib Syst 24(11):2171–2180 Hur J (2013) Attribute-based secure data sharing with hidden policies in smart grid. IEEE Trans Parallel Distrib Syst 24(11):2171–2180
11.
go back to reference Sushmita R, Milos S, Amiya N (2014) Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans Parallel Distrib Syst 25(2):384–394 Sushmita R, Milos S, Amiya N (2014) Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans Parallel Distrib Syst 25(2):384–394
12.
go back to reference Ming L, Yu S, Yao Z, Kui R, Wenjing L (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143 Ming L, Yu S, Yao Z, Kui R, Wenjing L (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143
13.
go back to reference Jahid S, Mittal P, Borisov N (2011) Easier: encryption-based access control in social networks with efficient revocation. In: Proceedings of the 6th ACM symposium on information, computer and communications security (ASIACCS’11), pp 411–415 Jahid S, Mittal P, Borisov N (2011) Easier: encryption-based access control in social networks with efficient revocation. In: Proceedings of the 6th ACM symposium on information, computer and communications security (ASIACCS’11), pp 411–415
14.
go back to reference Wei T, Geng Y, Yang X, Ting Z, Dongyang W (2015) Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Trans Cloud Comput 99:1–11 Wei T, Geng Y, Yang X, Ting Z, Dongyang W (2015) Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Trans Cloud Comput 99:1–11
15.
go back to reference Ciphertext-policy attribute-based encryption toolkit (2014) Ciphertext-policy attribute-based encryption toolkit (2014)
16.
go back to reference Lynn B (2012) The pairing-based cryptography (PBC) library Lynn B (2012) The pairing-based cryptography (PBC) library
17.
go back to reference Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE symposium on security and privacy, pp 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE symposium on security and privacy, pp 321–334
Metadata
Title
Tunable Access Control for Data Sharing in Cloud
Authors
S. Sabitha
M. S. Rajasree
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5258-8_85