Skip to main navigation Skip to search Skip to main content

Attribute-based fine-grained access control with efficient revocation in cloud storage systems

Kan Yang, Xiaohua Jia, Kui Ren

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

Abstract

A cloud storage service allows data owner to outsource their data to the cloud and through which provide the data access to the users. Because the cloud server and the data owner are not in the same trust domain, the semi-trusted cloud server cannot be relied to enforce the access policy. To address this challenge, traditional methods usually require the data owner to encrypt the data and deliver decryption keys to authorized users. These methods, however, normally involve complicated key management and high overhead on data owner. In this paper, we design an access control framework for cloud storage systems that achieves fine-grained access control based on an adapted Ciphertext-Policy Attribute-based Encryption (CP-ABE) approach. In the proposed scheme, an efficient attribute revocation method is proposed to cope with the dynamic changes of users' access privileges in large-scale systems. The analysis shows that the proposed access control scheme is provably secure in the random oracle model and efficient to be applied into practice. © 2013 ACM.
Original languageEnglish
Title of host publicationASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
Pages523-528
DOIs
Publication statusPublished - May 2013
Event8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013 - Hangzhou, China
Duration: 8 May 201310 May 2013

Conference

Conference8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013
PlaceChina
CityHangzhou
Period8/05/1310/05/13

Research Keywords

  • access control
  • attribute revocation
  • cloud storage
  • cp-abe

Fingerprint

Dive into the research topics of 'Attribute-based fine-grained access control with efficient revocation in cloud storage systems'. Together they form a unique fingerprint.

Cite this