Skip to main content

A CP-ABE Access Control Scheme Based on Proxy Re-encryption in Cloud Storage

  • Conference paper
  • First Online:
Book cover Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11064))

Included in the following conference series:

Abstract

With the popular application of cloud storage and the diversification of terminal devices, especially the widespread popularization of smart terminals. Users have more and more requirements for how to access information in the cloud safely and efficiently. Ciphertext policy attribute-based encryption (CP-ABE) is an effective method to achieve fine-grained access control of cloud data. However, the large decryption overhead is a potential problem of attribute-based encryption. In this paper, a CP-ABE access control scheme based on proxy re-encryption is proposed, it helps markedly reduce the user’s decryption overhead. Meanwhile, attribute revocation is provided for key update while ensuring fine-grained access control, and an improved decryption key generation method is proposed, which solves the data leakage problem caused by illegal stealing private key in the traditional CP-ABE scheme. A comparison with other CP-ABE schemes shows that our scheme has better decryption performance for mobile devices accessing cloud data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sukhodolskiy, I.A., Zapechnikov, S.V.: An access control model for cloud storage using attribute-based encryption. In: Young Researchers in Electrical and Electronic Engineering, pp. 578–581. IEEE (2017)

    Google Scholar 

  2. Wang, S., Zhou, J., Liu, J.K., et al.: An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(6), 1265–1277 (2016)

    Article  Google Scholar 

  3. De, S.J., Ruj, S.: Efficient decentralized attribute based access control for mobile clouds. IEEE Trans. Cloud Comput. PP(99), 1 (2017)

    Article  Google Scholar 

  4. Sun, G., Dong, Y., Li, Y.: CP-ABE based data access control for cloud storage. J. Commun. 32(7), 146–152 (2011)

    Google Scholar 

  5. Yang, G., Wang, D.-Y., Zhang, T., et al.: Attribute-based access control with multi-authority structure in cloud computing. J. Nanjing Univ. Posts Telecommun. (Nat. Sci.) 34(2), 1–9 (2014)

    Google Scholar 

  6. Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)

    Google Scholar 

  7. Yan, X., Meng, H.: Ciphertext policy attribute-based encryption scheme supporting direct revocation. J. Commun. 37(5), 44–50 (2016)

    Google Scholar 

  8. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Computer Society (2007)

    Google Scholar 

  9. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  10. Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Usenix Conference on Security, p. 34. USENIX Association (2011)

    Google Scholar 

  11. Zhang, R., Chen, P.S.: A dynamic cryptographic access control scheme in cloud storage services. J. Inf. Process. Manag. 4(1), 50–55 (2012)

    Google Scholar 

  12. Ohigashi, T., Nishimura, K., Aibara, R., et al.: Implementation and evaluation of secure outsourcing scheme for secret sharing scheme on cloud storage services. In: Computer Software and Applications Conference Workshops, pp. 78–83. IEEE (2014)

    Google Scholar 

  13. Hur, J.: Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25(10), 2271–2282 (2013)

    Article  Google Scholar 

  14. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_4

    Chapter  Google Scholar 

Download references

Acknowledgments

This research is supported by Education Information Research funded topic in Jiangsu Province (20172105), Nanjing University of Posts and Telecommunications Teaching Reform Project (JG06717JX66) and the special topic of Modern Educational Technology Research in Jiangsu province (2017-R-59518). The authors thank the sponsors for their support and the reviewers for helpful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haiyong Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, H., Peng, Y. (2018). A CP-ABE Access Control Scheme Based on Proxy Re-encryption in Cloud Storage. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11064. Springer, Cham. https://doi.org/10.1007/978-3-030-00009-7_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00009-7_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00008-0

  • Online ISBN: 978-3-030-00009-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics