Skip to main content

Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption

  • Conference paper
  • First Online:
Data Science (ICPCSEE 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 727))

Abstract

To solve the problems of data sharing in social network, such as management of private data is too loose, access permissions are not clear, mode of data sharing is too single and soon on, we design a hierarchical access control scheme of private data based on attribute encryption. First, we construct a new algorithm based on attribute encryption, which divides encryption into two phases, and we can design two types of attributes encryption strategy to make sure that different users could get their own decryption keys corresponding to their permissions. We encrypt the private data hierarchically with our algorithm to realize “precise”, “more accurate”, “fuzzy” and “private” four management modes, then users with higher permissions can access the private data inferior to their permissions. And we outsource some complex operations of decryption to DSP to ensure high efficiency on the premise of privacy protection. Finally, we analyze the efficiency and the security of our scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhu, Y.Q., Li, J.H., Zhang, Q.H.: A new dynamic hierarchical RBAC model for web services. J. Shanghai Jiaotong Univ. 41(5), 783–787 (2007)

    Google Scholar 

  2. Zhao, J.: Research on improved access control model based on T&RBAC. J. Yanshan Univ. 34(4), 331–335 (2010)

    Google Scholar 

  3. Li, H.M., Wang, H.J., Fu, L.: Organization-based access control model for web service. Comput. Eng. 40(11), 65–70 (2014)

    Google Scholar 

  4. Xiong, Z., Wang, P., Xu, J.Y., et al.: Attribute based access control strategy for enterprise cloud storage. Appl. Res. Comput. 30(2), 513–517 (2013)

    Google Scholar 

  5. Wang, X.W., Zhao, Y.M.: A task-role-based access control model for cloud computing. Comput. Eng. 38(24), 9–13 (2012)

    Google Scholar 

  6. Lv, Z.Q., Zhang, M., Feng, D.G.: Cryptographic access control scheme for cloud storage. J. Front. Comput. Sci. Technol. 5(9), 835–844 (2011)

    Google Scholar 

  7. Xiong, H.R., Chen, X.Y., Zhang, B., et al.: Scalable access control model based on double-tier role and organization. J. Electron. Inf. Technol. 37(7), 1612–1619 (2015)

    Google Scholar 

  8. Hao, X.L.: Application of improved RBAC model in grid video monitoring platform. Comput. Technol. Dev. 12, 212–215 (2014)

    Google Scholar 

  9. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). doi:10.1007/3-540-44647-8_13

    Chapter  Google Scholar 

  10. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Computer Society, Berkeley (2007)

    Google Scholar 

  11. Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. Israel Institute of Technology, Haifa (1996)

    Google Scholar 

  12. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Publ. Key Crypt. 6571, 53–70 (2011)

    MathSciNet  MATH  Google Scholar 

  13. Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Usenix Conference on Security, pp. 34–34. USENIX Association, San Francisco (2011)

    Google Scholar 

Download references

Acknowledgments

This work is supported by National Natural Science Foundation of China (61572521), Project funded by China Postdoctoral Science Foundation (2014M562445, 2015T81047).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yiliang Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Lin, X., Han, Y. (2017). Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption. In: Zou, B., Li, M., Wang, H., Song, X., Xie, W., Lu, Z. (eds) Data Science. ICPCSEE 2017. Communications in Computer and Information Science, vol 727. Springer, Singapore. https://doi.org/10.1007/978-981-10-6385-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6385-5_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6384-8

  • Online ISBN: 978-981-10-6385-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics