0% found this document useful (0 votes)
17 views

Introduction

Cloud computing techniques allow for utilizing IT resources in business domains by providing on-demand scalable services like data storage, databases, and computing power. While cloud storage provides benefits like reduced costs and remote access, data privacy and confidentiality are concerns since cloud servers may illegally access or disclose users' personal information. Attribute-based encryption (ABE) is a promising technique to address this issue by allowing data owners to specify access policies for encrypted data files such that only authorized users who match the policy can access the content, preventing disclosure to unauthorized parties. However, existing ABE schemes do not protect users' privacy as access policies sent with encrypted files can reveal sensitive information about data owners and users.

Uploaded by

Ajay Dakuri
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Introduction

Cloud computing techniques allow for utilizing IT resources in business domains by providing on-demand scalable services like data storage, databases, and computing power. While cloud storage provides benefits like reduced costs and remote access, data privacy and confidentiality are concerns since cloud servers may illegally access or disclose users' personal information. Attribute-based encryption (ABE) is a promising technique to address this issue by allowing data owners to specify access policies for encrypted data files such that only authorized users who match the policy can access the content, preventing disclosure to unauthorized parties. However, existing ABE schemes do not protect users' privacy as access policies sent with encrypted files can reveal sensitive information about data owners and users.

Uploaded by

Ajay Dakuri
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

INTRODUCTION

CLOUD techniques make it possible to utilize information technology resources


into business domain. The cloud provides variety of scalable services on-demand,
such as online databases, program interface, storage and computing resources, etc.
Users can obtain services through phones, laptops, and desktops as shown in Fig.
1. Cloud storage provides remote data storage and management services. It is also
helpful in data analyzing and computing, which is quite simple as it can provide a
variety of services at the same time. Cloud has many advantages in data storage,
such as decreasing communication cost and maintenance charge, saving resources,
allowing remote access, and so on. However, people might not be willing to store
their data in the cloud, even though it provides so many benefits because of the
data confidentiality and privacy problems. The cloud server (CS) may be untrusted,
in other words, if data is uploaded to cloud, the cloud service provider may obtain
and disclose users’ personal privacy, and even access and share the
data illegally [1].

To make sure the confidentiality of the data in cloud, people are inclined to encrypt
them before they are uploaded to cloud. But the general encryption algorithms
make the data process become difficult. ABE is a good candidate to overcome this
limitation. ABE was first proposed in 2005 by Sahai and Waters [2], which
guaranteed the data confidentiality and provided the fine-grained access control
policy to the customers. It has been widely accepted as an effective method
encrypting the outsourced data in cloud computing. ABE improves the efficiency
when the data owner (DO) intends to share data contents with multiusers. It
permits DO to specify an access policy to the encrypted files, which can make the
users who match it, access uploaded data. The users who do not satisfy the access
structure cannot get any information about the data contents. For instance, we
consider the data access control for a company. If the CEO intends to submit a
classified file, through the cloud, to the managers in sales department, planning
department, and research and development (R&D) department. Then he/she can
use an ABE scheme. First he/she encrypts the file and specifies an access structure
as ω = manager ∧ (sales department ∨planning department ∨ R&D). Next he/she
uploads the encrypted file and the access structure into the CS. Only the managers
in the three mentioned departments can access the classified file, and the managers
in other departments or the general staff in the three mentioned departments cannot
learn anything about the file even if they collude.

Most of ABE proposals perform very well in secure data sharing. However, the
personal privacy of the DO and the users is ignored in these constructions. For
convenience of recovering data, the access policy is always sent with ciphertexts.
In some scenarios, the access structure may carry sensitive information of users.
For instance, a patient wants to share his/her personal health record (PHR) with
some doctors and family members, but he/she may not want others to know that
he/she is sick. If the patient employs a normal ABE scheme to encrypt the PHR,
although the malicious user cannot get the contents of the PHR, he/she may get
some information about the users as shown in Fig. 2. The access policy contains
“cardiopathy” and “DC hospital” and the malicious third party may guess that the
DO is suffering from a heart attack and is treating in the DC hospital. Hence a
natural problem is how to keep the shared data secure, while the privacy of them is
also protected.

You might also like