首页|ACS-HCA: An Access Control Scheme Under Hierarchical Cryptography Architecture?

ACS-HCA: An Access Control Scheme Under Hierarchical Cryptography Architecture?

扫码查看
Binding access policies to data, Ciphertext-policy attribute-based encryption (CP-ABE) enables data access control to be independent from a certain application and lets users face data directly. It is regarded as one of the most suitable access control methods in cloud storage system and gets the attention of extensive researches. In those researches, Hierarchical cryptography architecture (HCA) is often applied to improve the efficiency of the system. There exist two open issues: illegal leakage of symmetric keys and low efficiency of revocation of an attribute of a user. We propose an Access control scheme under Hierarchical cryptography architecture (ACS-HCA). In this scheme, key derivation mechanism and forward derivation function are used to avoid the leakage of symmetric keys, All-or-Nothing transform is used to prevent the illegal reuse of symmetric keys, and attribute revocation is realized without re-issuing other users' private keys. Analyses and simulations demonstrate that our scheme sustains less encrypting cost on each owner and less decrypting cost on each user, but gain high efficiency in revocation of an attribute of a user.

Cloud storageAccess controlCiphertext-policy attribute-based encryptionHierarchical cryptography architectureAttribute revocation

SHI Jiaoli、HUANG Chuanhe、HE Kai、SHEN Xieyang

展开 >

State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan 430072, China

Collaborative Innovation Center of Geospatial Technology, Wuhan 430072, China

Jiujiang University, Jiujiang 332005, China

Wuhan Textile University, Wuhan 430072, China

展开 >

This work is supported by the National Natural Science Foundation of ChinaThis work is supported by the National Natural Science Foundation of China

6137304061772385

2019

中国电子杂志(英文版)

中国电子杂志(英文版)

CSTPCDCSCDSCIEI
ISSN:1022-4653
年,卷(期):2019.28(1)
  • 14