Skip to main content

Fine-Grained Access Control and Secured Data Sharing in Cloud Computing

  • Conference paper
  • First Online:
Cyber Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

Abstract

In cloud computing data, outsourcing is one of the most convenient, cost–efficient, and cheapest ways for users to share their data with remote clients. However, the main problem is that the owner loses its physical control on data and so the main challenge is how to secure and share the data efficiently and maintaining fine-grained access control on it. Several approaches have been proposed including attribute-based encryption and proxy re-encryption for secured data sharing through cloud service providers. In this paper, we have given a survey and comparison of different attribute-based encryption and proxy re-encryption techniques. We have also proposed that threshold cyptosystem can be used for secured and efficient data sharing in cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53:50–58

    Article  Google Scholar 

  2. Mell P, Grance T (2009) The NIST definition of cloud computing. Technical report, National Institute of Standards and Technology, Information Technology Laboratory, July 2009. http://www.csrc.nist.gov/groups/sns/cloud-computing/

  3. Qian L, Luo Z, Du Y, Guo L (2009) Cloud computing: an overview. In: Proceedings of the 1st international conference on cloud computing, CLOUDCOM’09. Springer, Berlin, pp 626–631

    Google Scholar 

  4. Rimal B, Choi E, Lumb I (2009) A taxonomy and survey of cloud computing systems. In: IEEE fifth international joint conference on INC, IMS and IDC, pp 44 –51, Aug 2009

    Google Scholar 

  5. Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18

    Article  Google Scholar 

  6. Hanna S. Cloud computing: finding the silver lining. http://www.ists.dartmouth.edu/events/abstract-hanna.html

  7. Kantarcioglu M, Clifton C (2005) Security issues in querying encrypted data. In: Proceedings of the 19th annual working conference on data and applications security, DBSEC’05. Springer, Berlin, pp 325–337

    Google Scholar 

  8. Cantor S, Sigaba JM, Philpott R, Maler E (2005) Metadata for the OASIS security assertion markup language (SAML) v2.0”, copyright © OASIS open

    Google Scholar 

  9. Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R, Molina J (2009) Controlling data in the cloud: Outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM workshop on cloud computing security (CCSW), pp 85–90

    Google Scholar 

  10. Dahbur K, Mohammad B, Tarakji AB (2011) Security issues in cloud computing: a survey of risks, threats and vulnerabilities. Int J Cloud Appl Comput (IJCAC) 1

    Article  Google Scholar 

  11. Dhage SN, Meshram BB, Rawat R, Padawe S, Paingaokar M, Misra A (2011) Intrusion detection system in cloud computing environment. In: Proceedings of the international conference & workshop on emerging trends in technology, ICWET’11, pp 235–239

    Google Scholar 

  12. Kandukuri B, Paturi V, Rakshit A (2009) Cloud security issues. In: IEEE International conference on services computing, pp 517–520

    Google Scholar 

  13. Singh G, Sharma A, Lehal MS (2011) Security apprehensions in different regions of cloud captious grounds. Int J Network Secur Its Appl (IJNSA) 3

    Google Scholar 

  14. Brodkin J. Gartner: seven cloud-computing security risks. http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853

  15. Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third—party compute clouds. In: Proceedings of the 16th ACM conference on computer and communications security, CCS’09. ACM, New York, pp 199–212

    Google Scholar 

  16. Wang C, Wang Q, Ren K, Lou W (2009) Ensuring data storage security in cloud computing. In: International workshop on quality of service, pp 1 –9, July 2009

    Google Scholar 

  17. Salesforce.com. warns customers of phishing scam. http://www.pcworld.com/article/139353/article.html

  18. Yan L, Rong C, Zhao G (2009) Strengthen cloud computing security with federal identity management using ierarchical identity-based cryptography. In: Proceedings of the 1st international conference on cloud computing, CLOUDCOM’09. Springer, Berlin, pp 167–177

    Google Scholar 

  19. Lu R, Lin X, Liang X, Shen XS (2010) Secure provenance: the essential of bread and butter of data forensics in cloud computing. In: Proceedings of the 5th ACM symposium on information, computer and communications security, ASIACCS’10. ACM, New York

    Google Scholar 

  20. Lin D, Squicciarini A (2010) Data protection models for service provisioning in the cloud. In: Proceeding of the 15th ACM symposium on access control models and technologies, SACMAT’10, pp 183–192

    Google Scholar 

  21. Nyre AA, Jaatun M (2009) Privacy in a semantic cloud: whats trust got to do with it? In: Cloud computing, volume 5931 of lecture notes in computer science. Springer, Berlin, pp 107–118

    Google Scholar 

  22. Pearson S, Shen Y, Mowbray M (2009) A privacy manager for cloud computing. In: Proceedings of the 1st international conference on cloud computing, CLOUDCOM’09. Springer, Berlin, pp 90–106

    Google Scholar 

  23. Thuraisingham B, Khadilkar V, Gupta A, Kantarcioglu M, Khan L (2010) Secure data storage and retrieval in the cloud. In: Collaborative computing: networking, applications and worksharing (collaboratecom), pp 1–8, Oct 2010

    Google Scholar 

  24. Uemura T, Dohi T, Kaio N (2009) Availability analysis of a scalable intrusion tolerant architecture with two detection modes. In: Proceedings of the 1st international conference on cloud computing, CLOUDCOM’09. Springer, Berlin, pp 178–189

    Google Scholar 

  25. A. S. A. event. July 20, 2008. http://status.aws.amazon.com/s3-0080720.html

  26. Takabi H, Joshi J, Ahn G (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Privacy 8(6):24–31

    Article  Google Scholar 

  27. Jansen W, Grance T (2011) Draft special publication 800-144: guidelines on security and privacy in public cloud computing. National Institute of Standards and Technology, U.S. Department of Commerce

    Google Scholar 

  28. Andrei T (2009) Cloud computing challenges and related security issues

    Google Scholar 

  29. Agudo I, Nuez D, Giammatteo G, Rizomiliotis P, Lambrinoudakis C (2011) Cryptography goes to the cloud. in secure and trust computing, data management, and applications, vol 187 of communications in computer and information science. Springer, Berlin, pp 190–197

    Google Scholar 

  30. Santos N, Gummadi KP, Rodrigues R (2009) Towards trusted cloud computing. In: Proceedings of the 2009 conference on hot topics in cloud computing, HOTCLOUD’09, Berkeley, CA, USA. Usenix Association

    Google Scholar 

  31. Bethencourt J, Sahai A, Waters B (2007 )Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE symposium on security and privacy

    Google Scholar 

  32. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology—EUROCRYPT 2005. Springer, Berlin, pp 457–473

    Google Scholar 

  33. Goyal V, Pandy O, Sahai A, Waters B (2006) Attribute based encryption for fine-grained access control of encrypted data. In: Proceedings of ACM computer and communications security conference, CCS’06

    Google Scholar 

  34. Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceeding of ACM conference on computer and communications security, pp 195–203

    Google Scholar 

  35. Tang Q, Ji D (2010) Verifiable attribute-based encryption. Int J Network Secur 10(2):114–120

    Google Scholar 

  36. Müller S, Katzenbeisser S, Eckert C (2009) Distributed attribute-based encryption. In: Proceedings of 11th international conference on information security and cryptology (ICISC 08), pp 20–36

    Chapter  Google Scholar 

  37. Boneh D, Franklin MK (2003) Identity-based encryption from the weil pairing. SIAM J Comput 32(3):586–615

    Article  MathSciNet  Google Scholar 

  38. Boneh D, Boyen X, Goh E-J (2005) Hierarchical identity based encryption with constant size ciphertext. In: Cramer R (ed) Eurocrypt, volume 3494 of lecture notes in computer science. Springer, Berlin, pp 440–456

    Google Scholar 

  39. Wang G, Liu Q, Wu J (2010) Hierarhical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of ACM conference on computer and communications security, CCS’ 10

    Google Scholar 

  40. Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743–754

    Article  Google Scholar 

  41. Tang Q (2008) Type-based proxy re-encryption and its construction. In: Proceedings of ninth international conference on cryptology in India, pp 130–144

    Chapter  Google Scholar 

  42. Ateniese G, Benson K, Hohenberger S (2009) Key-private proxy re-encryption. In: Proceedings topics in cryptology, pp 279–294

    Chapter  Google Scholar 

  43. Shamir A (1984) Identity-based cryptosystems and signatures schemes. Adv Cryptol 47–53

    Google Scholar 

  44. Libert B, Vergnaud D (2008) Tracing malicious proxies in proxy re-encryption. In: Proceedings of PAIRING’08. LNCS 5209. Springer, Berlin, pp 332–353

    Google Scholar 

  45. Liu Q, Wang G, Wu J (2012) Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Information sciences (in press)

    Google Scholar 

  46. Asharov G, Jain A, Lopez-Alt A, Tromer E, Vaikuntanathan V, Wichs D (2012) Multiparty computation with low communication, computation and interaction via threshold FHE. In: Proceeding of eurocrypt’12. Springer, Berlin, pp 483–501

    Chapter  Google Scholar 

  47. Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE international conference on computer communications, INFOCOM’10

    Google Scholar 

  48. Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Proceedings of advances in cryptology, eurocrypt’98

    Google Scholar 

  49. Yang Y, Zhang Y (2011) A generic scheme for secure data sharing in cloud. In: 40th international conference on parallel processing workshops, pp 145–153, Sept 2011

    Google Scholar 

  50. Samanthula BK et al (2015) A secure data sharing and query processing framework via federation of cloud computing. Inf Syst 48:196–212

    Article  Google Scholar 

  51. Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the 4th conference on theory of cryptography, TCC’07. Springer, Berlin, pp 535–554

    Google Scholar 

  52. Hakan H, Iyer B, Li C, Mehrotra S (2002) Executing Sql over encrypted data in the database-service provider model. In: Proceedings of the 2002 ACM sigmod international conference on management of data, SIGMOD’02. ACM, pp 216–227

    Google Scholar 

  53. Hore B, Mehrotra S, Canim M, Kantarcioglu M (2012) Secure multidimensional range queries over outsourced data. VLDB J 21(3):333–358

    Article  Google Scholar 

  54. Wang S, Agrawal D, El Abbadi A (2011) A comprehensive framework for secure query processing on relational data in the cloud. In: Proceedings of the 8th VLDB international conference on secure data management, SDM’11. Springer, Berlin, pp 52–69

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neha Agarwal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Agarwal, N., Rana, A., Pandey, J.P. (2018). Fine-Grained Access Control and Secured Data Sharing in Cloud Computing. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics