Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment
Abstract
Cloud computing service provider cannot be totally trusted due to data security reasons, risk of data security and violation of privacy factors should be considered. Especially, guaranteeing data confidentiality is required. To solve these problems, S.C. Yu etc. proposed scheme which guarantees data confidentiality and fine-grained access control. However, data confidentiality can be violated by collusion attack of revoked user and cloud server. To solve this problem, we guaranteed data confidentiality by storing and dividing data file into header and body. In addition, the method of selective delegation regarding the whole or partial message according to delegator’s reliability towards delegate using type-based re-encryption was specified.
Keywords
Cloud Computing Cloud Server Access Structure Cloud Environment Cloud Service ProviderPreview
Unable to display preview. Download preview PDF.
References
- 1.CSA : Security Guidance for Critical Areas of Focus Cloud Computing, vol. 2.1 (2009) Google Scholar
- 2.Benaloh, J., Chase, M., Horvitz, E., Lauter, K.: Patient controlled encryption: ensuring privacy of electronic medical records. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 103–114. Association for Computing Machinery, New York (2009)Google Scholar
- 3.Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-Policy Attribute-Based Encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 321–334 (2007)Google Scholar
- 4.Ibraimi, L., Tang, Q., Hartel, P., Jonker, W.: A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. In: 5th VLDB Workshop on Secure Data Management, SDM, August 24, pp. 185–198 (2008)Google Scholar
- 5.Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998)CrossRefGoogle Scholar
- 6.Yu, S.C., Wang, C., Ren, K.I., Lou, W.J.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: INFOCOM, 2010 Proceedings IEEE, pp. 321–334 (2010)Google Scholar
- 7.Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O’Reilly Media, Sebastopol (2009)Google Scholar
- 8.Park, N., Kwak, J., Kim, S., Won, D.H., Kim, H.W.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
- 9.Park, N., Kim, H.W., Kim, S., Won, D.H.: Open location-based service using secure middleware infrastructure in web services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 10.Park, N., Kim, H.W., Kim, S., Won, D.H.: Open location-based service using secure middleware infrastructure in web services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 11.Park, N., Kim, S., Won, D.: Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. In: ASC, Advances in Soft Computing, vol. 43, pp. 151–156. Springer, Heidelberg (2007)Google Scholar
- 12.Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. Communications in Computer and Information Science, vol. 106, pp. 72–79. Springer, Heidelberg (2010)CrossRefGoogle Scholar
- 13.Park, N., Kim, S., Won, D.H., Kim, H.W.: Security analysis and implementation leveraging globally networked rFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)CrossRefGoogle Scholar
- 14.Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proc. of CCS 2006. Association for Computing Machinery, New York (2006)Google Scholar