NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems

Xiao-long Xu , Qi-tong Zhang , Jing-lan Zhou

Journal of Central South University ›› 2017, Vol. 24 ›› Issue (4) : 807 -818.

PDF
Journal of Central South University ›› 2017, Vol. 24 ›› Issue (4) : 807 -818. DOI: 10.1007/s11771-017-3483-z
Article

NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems

Author information +
History +
PDF

Abstract

The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption (NC-MACPABE). NC-MACPABE optimizes the weighted access structure (WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users’ information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user’s access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time.

Keywords

cloud storage / data privacy / proxy re-encryption / multi-authority

Cite this article

Download citation ▾
Xiao-long Xu, Qi-tong Zhang, Jing-lan Zhou. NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems. Journal of Central South University, 2017, 24(4): 807-818 DOI:10.1007/s11771-017-3483-z

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

XuX-l, TuQ, NikB, YangG, WangX-heng. SATVPC: Secure-agent-based trustworthy virtual private cloud model in open computing environments [J]. Journal of Central South University, 2014, 21(8): 3186-3196

[2]

ZhangJ, ZhangZ-feng. Secure and efficient datasharing in clouds [J]. Concurrency and Computation: Practice and Experience, 2015, 27(8): 2125-2143

[3]

FengD-g, ZhangM, ZhangY, XuZhen. Study on cloud computing security [J]. Journal of Software, 2011, 22(1): 71-83

[4]

ZouD-q, Jinh, QiangW-z, XuPeng. Challenge and practice of cloud computing Security [J]. Communications of the China Computer Federation, 2011, 7(12): 55-61

[5]

YuN-h, HaoZ, XuJ-jia. Review of cloud computing security [J]. Chinese Journal of Electronics, 2013, 41(2): 371-381

[6]

HuF, QiuM-k, LiJ-y, GrantT, TaylorD, MccalebS, ButlerL, HamnerR. A review on cloud computing: Design challenges in architecture and security [J]. Journal of Computing and Information Technology, 2011, 19(1): 25-55

[7]

RishiIApple to Strengthen Security After iCloud Nude Celebrity Photos Leak [EB/OL], 2014

[8]

Cloud Security Alliance.Security guidance for critical areas of focus in cloud computing v2.1 [EB/OL], 2013

[9]

SuJ-s, CaoD, WangX-f, SunY-p, HuQ-lin. Attribute-based encryption schemes [J]. Journal of Software, 2011, 22(6): 1299-1315

[10]

XueW, ShuJ-w, LiuY, XueMao. Corslet: A shared storage system keeping your data private [J]. Science China Information Sciences, 2011, 54(6): 1119-1128

[11]

MahajanP, SettyS, LeeS, ClementA, AlvisiL, DahlinM, WalfishM. Depot: Cloud storage with minimal trust [J]. ACM Transactions on Computer Systems, 2011, 29(4): 1-38

[12]

ShraerA, CachinC, CidonA, KeidarI, MichalevskyY, ShaketDVenus: Verification for untrusted cloud storage [C]// Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, 2010New YorkACM19-30

[13]

RoyI, SettyS T V, KilzerA, ShmatikovV, WitchelEAiravat: Security and privacy for mapreduce [C]// Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, 201010297-312

[14]

YanL, RongC-m, ZhaoG-senStrengthen cloud computing security with federal identity management using hierarchical identity-based cryptography [C]// Proceedings of 1st International Conference, 2009BerlinSpringer167-177

[15]

WangQ, WangC, LiJ, RenK, LouW-jingEnabling public verifiability and data dynamics for storage security in cloud computing [C]// Proceedings of Computer Security–ESORICS 2009, 2009BerlinSpringer355-370

[16]

DamianiE, PaganoF, PaganoD. iPrivacy: A distributed approach to privacy on the cloud [J]. International Journal on Advances in Security, 2011, 4(3): 185-197

[17]

MaoJ, LiK, XuX-dong. Privacy protection scheme for cloud computing [J]. Journal of Tsinghua University(Science and Technology), 2011, 51(10): 1357-1362

[18]

HuangR-w, GuiX-l, YuS, YuWei. Privacy-preserving computable encryption scheme of cloud computing [J]. Chinese Journal of Computers, 2011, 34(12): 2391-2402

[19]

ShamirA. Identity-based cryptosystems and signature schemes [J]. Lecture Notes in Computer Science, 1984, 21(2): 47-53

[20]

BonehD, FranklinMIdentity-based encryption from the Weil pairing [C]// Proceedings of the 10th Cryptology Conference on Advances in Cryptology, 2001BerlinSpringer213-229

[21]

SahaiA, WatersBFuzzy identity-based encryption [C]// Proceedings of the 2005 Annual Eurocrypt Conference, 2005BerlinSpringer457-473

[22]

GoyalV, PandeyO, SahaiA, WatersBAttribute-based encryption for fine-grained access control of encrypted data [C]// Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006New YorkACM89-98

[23]

BethencourtJ, SahaiA, WatersBCiphertext-policy attribute-based encryption [C]// Proceedings of the 2007 IEEE Symposium on Security and Privacy, 2007WashingtonIEEE Computer Society321-334

[24]

ChaseMMulti-authority attribute based encryption [C]// Proceedings of Theory of Cryptography Conference, 2007BerlinSpringer515-534

[25]

BozovicV, SocekD, SteinwandtR, VillanyiV I. Multi-authority attribute-based encryption with honest-but-curious central authority [J]. International Journal of Computer Mathematics, 2012, 89(3): 268-283

[26]

LinH, CaoZ-f, LiangX-h, ShaoJun. Secure threshold multi authority attribute based encryption without a central authority [J]. Information Sciences, 2010, 180(13): 2618-2632

[27]

BlazeM, BleumerG, StraussMDivertible protocols and atomic proxy cryptography [C]// Proceedings of the 1998 International Conference on the Theory and Application of Cryptographic Techniques Espoo, 1998BerlinSpringer127-144

[28]

AtenieseG, FuK, GreenM, HohenbergerS. Improved proxy re-encryption schemes with applications to secure distributed storage [J]. ACM Transactions on Information and System Security, 2006, 9(1): 1-30

AI Summary AI Mindmap
PDF

106

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/