Privacy Protection Based Access Control Scheme in Cloud-Based Services - 1crore Projects
Privacy Protection Based Access Control Scheme in Cloud-Based Services - 1crore Projects
Cloud-based Services
Kai Fan, Qiong Tian, Nana Yue Wang Hui Li Yintang Yang
Huang School of Information State Key Laboratory of Key Lab. of the Minist. of
State Key Laboratory of Engineering Integrated Service Networks Educ. for Wide Band-Gap
Integrated Service Networks Xi’an University Xidian University Semiconductor Materials and
Xidian University Xi’an, China Xi’an, China Devices
Xi’an, China [email protected] [email protected] Xidian University
[email protected] Xi’an, China
[email protected] [email protected]
[email protected]
he can send the file ID and his signature SG to the cloud 0.25
server, then the cloud servers delete the files after verifying 0.2
the signature of the data owner.
0.15
4. Attribute revocation: The authority assigns attributes to
each user and attaches the set of attributes with an expiration 0.1
null. Set a new expiration time to each attribute set, generate MAH-ABE scheme spent much more time than the KAE
new private key components and return it to the client. algorithm used in our scheme. If the attribute revocation
occurs, the ABE algorithm will be more time-consuming. More
V. SYSTEM SIMULATION AND importantly, the growth rate of time spent with the number of
PERFORMANCE ANALYSIS file attributes is much higher than KAE algorithm. The
simulation results show the high efficiency of our scheme.
A. Security Analysis In Fig.5, the user only needs a very short time to sign the
In PSD, the user can only decrypt the files corresponding modified files. While, the authentication time only makes up a
to the received aggregate keys and do not have access to other small part, so the process of signature and authentication
files, so that the data owner controls the users’ access consume a very small time. Therefore, from the client's
permissions. When the data file is modified, although CA is perspective, the program is efficient.
trusted, also the system parameters and revocation instructions
are generated by the CA. The signature policy is formulated
by
ACKNOWLEDGMENT
1.6
Signature time This paper is supported by the National Natural Science
1.4 Certification time
Foundation of China (No. 61303216, No. 61272457, No.
Total time of IABS
U1401251, and No. 61373172), the National High Technology
1.2
Research and Development Program of China (863 Program)
1
(No. 2012AA013102), the China Postdoctoral Science
Foundation funded project (No.2013M542328), and National
Time consuming
0.6
REFERENCES
0.4
[1] S. Yu, C. Wang, K. Ren, “Achieving secure, scalable, and fine-grained
data access control in cloud computing,” Proc. IEEE INFOCOM, pp. 1-9,
0.2
2010.
[2] J. Bethencourt, A. Sahai, B. Waters, “Ciphertext-policy attribute-based
0
10 30 50 70 90 110 encryption,” Proc. Security and Privacy, pp. 321-334, 2007.
The number of leaf nodes
[3] J. Hur, D.K. Noh, “Attribute-based access control with efficient
revocation in data outsourcing systems,” IEEE Transactions on Parallel
Figure 5. The signature and authenticationtime of IABS and Distributed Systems, vol. 22, no. 7 pp. 1214-1221, 2011.
[4] A. Lewko, B. Waters, “Decentralizing attribute-Based encryption,” Proc.
Advances in Cryptology-EUROCRYPT, pp. 568-588, 2011.
VI. CONCLUSIONS [5] M. Li, S. Yu, Y. Zheng, “Scalable and secure sharing of personal health
records in cloud computing using attribute-Based Encryption,” IEEE
In this paper, we propose access control system (PS-ACS), Transactions on Parallel and Distributed System, vol. 24, no. 1, pp. 131-
which is privilege separation based on privacy protection. 143, 2013.
Through the analysis of cloud environment and the [6] C.K. Chu, S.S.M. Chow, W.G. Tzeng, “Key-aggregate cryptosystem for
characteristics of the user, we divide the users into personal scalable data sharing in cloud storage,” IEEE Transactions on Parallel
domain (PSD) and public domain(PUD) logically. In the PSD, and Distributed Systems, vol. 25, no. 2, pp.468-477, 2014.
the KAE algorithm is applied to implement users read access [7] J. Li, K. Kim, “Hidden attribute-based signatures without anonymity
permissions and greatly improved efficiency. The IABS revocation,” Information Sciences, vol. 180, no. 9, pp. 1681-1689, 2010.
scheme is employed to achieve the write permissions and the [8] H.K. Maji, M. Prabhakaran, M. Rosulek, “Attribute-Based Signatures,”
Proc. Topics in Cryptology - CT-RSA, pp. 376-392, 2011.
separation of read and write permissions to protect the privacy
[9] S. Kumar, S. Agrawal, S. Balaraman, “Attribute based signatures for
of the user's identity. In the PUD, we use the HABE scheme to
bounded multi-level threshold circuits,” Proc. Public Key Infrastructures,
avoid the issues of single point of failure and to achieve data Services and Applications, pp. 141-154, 2011.
sharing. Furthermore, the paper analyzes the scheme from
security and efficiency, and the simulation results are given.
By comparing with the MAH-ABE scheme, the proposed
scheme shows the feasibility and superiority to protect the
privacy of data in cloud-based services.