Abstract
To solve the problems of data sharing in social network, such as management of private data is too loose, access permissions are not clear, mode of data sharing is too single and soon on, we design a hierarchical access control scheme of private data based on attribute encryption. First, we construct a new algorithm based on attribute encryption, which divides encryption into two phases, and we can design two types of attributes encryption strategy to make sure that different users could get their own decryption keys corresponding to their permissions. We encrypt the private data hierarchically with our algorithm to realize “precise”, “more accurate”, “fuzzy” and “private” four management modes, then users with higher permissions can access the private data inferior to their permissions. And we outsource some complex operations of decryption to DSP to ensure high efficiency on the premise of privacy protection. Finally, we analyze the efficiency and the security of our scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhu, Y.Q., Li, J.H., Zhang, Q.H.: A new dynamic hierarchical RBAC model for web services. J. Shanghai Jiaotong Univ. 41(5), 783–787 (2007)
Zhao, J.: Research on improved access control model based on T&RBAC. J. Yanshan Univ. 34(4), 331–335 (2010)
Li, H.M., Wang, H.J., Fu, L.: Organization-based access control model for web service. Comput. Eng. 40(11), 65–70 (2014)
Xiong, Z., Wang, P., Xu, J.Y., et al.: Attribute based access control strategy for enterprise cloud storage. Appl. Res. Comput. 30(2), 513–517 (2013)
Wang, X.W., Zhao, Y.M.: A task-role-based access control model for cloud computing. Comput. Eng. 38(24), 9–13 (2012)
Lv, Z.Q., Zhang, M., Feng, D.G.: Cryptographic access control scheme for cloud storage. J. Front. Comput. Sci. Technol. 5(9), 835–844 (2011)
Xiong, H.R., Chen, X.Y., Zhang, B., et al.: Scalable access control model based on double-tier role and organization. J. Electron. Inf. Technol. 37(7), 1612–1619 (2015)
Hao, X.L.: Application of improved RBAC model in grid video monitoring platform. Comput. Technol. Dev. 12, 212–215 (2014)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). doi:10.1007/3-540-44647-8_13
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Computer Society, Berkeley (2007)
Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. Israel Institute of Technology, Haifa (1996)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Publ. Key Crypt. 6571, 53–70 (2011)
Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Usenix Conference on Security, pp. 34–34. USENIX Association, San Francisco (2011)
Acknowledgments
This work is supported by National Natural Science Foundation of China (61572521), Project funded by China Postdoctoral Science Foundation (2014M562445, 2015T81047).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lin, X., Han, Y. (2017). Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption. In: Zou, B., Li, M., Wang, H., Song, X., Xie, W., Lu, Z. (eds) Data Science. ICPCSEE 2017. Communications in Computer and Information Science, vol 727. Springer, Singapore. https://doi.org/10.1007/978-981-10-6385-5_19
Download citation
DOI: https://doi.org/10.1007/978-981-10-6385-5_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6384-8
Online ISBN: 978-981-10-6385-5
eBook Packages: Computer ScienceComputer Science (R0)