Improving Security Data Access Control for Multi-Authority Cloud Storage

Cloud computing have brought a lot of advantages, such as reducing the hardware cost and providing a convenient cloud storage service. More and more people choose to put their private data in the cloud. To improve data security and privacy, Wu et al. proposed a new extensive data access control scheme for multi-authority cloud storage systems (NEDAC-MACS) on the basis of the scheme of Yang et al. In this paper, we propose a new scheme that can resist the collusion of the cloud server and user to improve the security of NEDAC-MACS. The cryptographic analysis show that our scheme is still secure in the random oracle.

[1]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[2]  Jian Shen,et al.  User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage , 2018, IEEE Systems Journal.

[3]  Jian Wang,et al.  Dynamic Data Access Control for Multi-Authority Cloud Storage , 2019, 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[4]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[5]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[6]  Ivan Stojmenovic,et al.  DACC: Distributed Access Control in Clouds , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[7]  Bharat K. Bhargava,et al.  On the Security of Data Access Control for Multiauthority Cloud Storage Systems , 2017, IEEE Transactions on Services Computing.

[8]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[9]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[10]  Allison Bishop,et al.  Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.

[11]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[12]  Xiaohua Jia,et al.  DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems , 2013, IEEE Transactions on Information Forensics and Security.

[13]  Sherman S. M. Chow,et al.  Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.

[14]  Brent Waters,et al.  Practical constructions and new proof methods for large universe attribute-based encryption , 2013, CCS.

[15]  Xiaohua Jia,et al.  DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems , 2013 .

[16]  Dengguo Feng,et al.  Efficiently Attribute-Based Access Control for Mobile Cloud Storage System , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[17]  Jianwei Chen,et al.  Efficient decentralized attribute-based access control for cloud storage with user revocation , 2014, 2014 IEEE International Conference on Communications (ICC).

[18]  Dong Kun Noh,et al.  Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.

[19]  Wenfen Liu,et al.  Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage , 2018, IEEE Systems Journal.

[20]  Kui Ren,et al.  Attribute-based fine-grained access control with efficient revocation in cloud storage systems , 2013, ASIA CCS '13.

[21]  Huaqun Wang,et al.  Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems , 2017, IEEE Access.

[22]  Xiaohua Jia,et al.  Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.

[23]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.