Skip to main content

Tunable Access Control for Data Sharing in Cloud

  • Conference paper
  • First Online:
Evolutionary Computing and Mobile Sustainable Networks

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 53))

Abstract

Attribute-Based Encryption (ABE) suffers communication and computation overhead due to the linearly varying size of the ciphertext and the secret key, depending on the number of attributes in the access policy. This paper proposes a multilevel attribute-based access control scheme for secure data sharing in the cloud to reduce the overhead. It produces a constant size ciphertext and a compact secret key to efficiently utilize the storage space and reduce the communication cost. This method flexibly shares ciphertext classes among the randomly selected users with a specific set of attributes. All other ciphertext classes outside the set remain confidential. It allows dynamic data updates and provides access control of varying granularity, at user-level, at file-level, and attribute-level. Granularity levels can be chosen based on applications and user demands. This scheme tackles user revocation and attribute revocation problems, and prevents forward and backward secrecy issues. It allows the data owner to revoke a specific user or a group of users. It is very useful for secure data storage and sharing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang Guojun, Liu Qin, Jie Wu, Guo Minyi (2011) Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput Secur (Elsevier) 30:320–331

    Article  Google Scholar 

  2. Wan Z, Liu J, Deng RH (2012) HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743–754

    Google Scholar 

  3. Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inform Sci 275:370–384

    Article  MathSciNet  Google Scholar 

  4. Teng W, Yang G, Xiang Y, Zhang T, Wang D (2016) Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Trans Cloud Comput. (99):1

    Google Scholar 

  5. Dong X, Yu J, Zhu Y, Chen Y, Luo Y, Li M (2015) Seco: secure and scalable data collaboration services in cloud computing. Comput Secur 50:91–105

    Article  Google Scholar 

  6. Huang Q, Yang Y, Shen M (2017) Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Future Gener Comput Syst 72:239–249

    Article  Google Scholar 

  7. Chu C-K, Chow SSM, Tzeng W-G, Zhou J, Deng RH (2014) Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Trans Parallel Distrib Syst 25(2):468–477

    Google Scholar 

  8. Zuo C, Shao J, Liu JK, Wei G, Ling Y (2018) Fine-grained two-factor protection mechanism for data sharing in cloud storage. IEEE Trans Inf Forensics Secur 13(1):186–196

    Google Scholar 

  9. Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221

    Google Scholar 

  10. Hur J (2013) Attribute-based secure data sharing with hidden policies in smart grid. IEEE Trans Parallel Distrib Syst 24(11):2171–2180

    Google Scholar 

  11. Sushmita R, Milos S, Amiya N (2014) Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans Parallel Distrib Syst 25(2):384–394

    Google Scholar 

  12. Ming L, Yu S, Yao Z, Kui R, Wenjing L (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143

    Google Scholar 

  13. Jahid S, Mittal P, Borisov N (2011) Easier: encryption-based access control in social networks with efficient revocation. In: Proceedings of the 6th ACM symposium on information, computer and communications security (ASIACCS’11), pp 411–415

    Google Scholar 

  14. Wei T, Geng Y, Yang X, Ting Z, Dongyang W (2015) Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Trans Cloud Comput 99:1–11

    Google Scholar 

  15. Ciphertext-policy attribute-based encryption toolkit (2014)

    Google Scholar 

  16. Lynn B (2012) The pairing-based cryptography (PBC) library

    Google Scholar 

  17. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE symposium on security and privacy, pp 321–334

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Sabitha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sabitha, S., Rajasree, M.S. (2021). Tunable Access Control for Data Sharing in Cloud. In: Suma, V., Bouhmala, N., Wang, H. (eds) Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 53. Springer, Singapore. https://doi.org/10.1007/978-981-15-5258-8_85

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5258-8_85

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5257-1

  • Online ISBN: 978-981-15-5258-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics