Skip to main content

CP-ABE Based Access Control for Cloud Storage

  • Conference paper
  • First Online:
Information Technology and Intelligent Transportation Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 455))

Abstract

CP-ABE (Cipher-text Policy Attribute Based Encryption) can help providing reliable, fine-grained access control in untrusted cloud storage environment, since users can access to data files only if their attributes satisfy the access policies associated with the files. However, CP-ABE has two main drawbacks: its policies are not expressed using standard languages and it can’t support non-monotonic policies. So we extended CP-ABE to support XACML (eXtensible Access Control Markup Language) based policy transformation and to support logical NOT in policies through De Morgan’s Laws. And then we applied it to a secure overlay cloud storage system called FADE to deploy access control for Amazon S3 cloud storage service. The simulation results show that our proposal is practical and time efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE symposium on security and privacy ieee computer society, pp 321–334

    Google Scholar 

  2. eXtensible Access Control Markup Language (XACML) Version 3.0 (2013). http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html

  3. CPABE toolkit (2011). http://hms.isi.jhu.edu/acsc/cpabe/

  4. Tang Y, Lee PPC, Lui JCS, Perlman R (2012) Secure overlay cloud storage with access control and assured deletion. IEEE Trans Dependable Sec Comput 9(6):903–916

    Article  Google Scholar 

  5. FADE - Secure Overlay Cloud Storage with File Assured Deletion (2011). http://ansrlab.cse.cuhk.edu.hk/software/fade/

  6. The XML C parser and toolkit of Gnome libxml (2015). http://xmlsoft.org/

  7. De Morgan’s laws (2015). http://en.wikipedia.org/wiki/De_Morgans_laws

  8. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  9. Shamir’s Secret Sharing Scheme (2013). http://point-at-infinity.org/ssss/

  10. Blind signature (2014). http://en.wikipedia.org/wiki/Blind_signature

Download references

Acknowledgments

This work is supported by the Key Project of National Defense Basic Research Program of China under Grant No. B1120132031, and by the Opening Project of Key Lab of Information Network Security of Ministry of Public Security (The Third Research Institute of Ministry of Public Security) of China under Grant No.C10604.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this paper

Cite this paper

Wang, Y., Wei, L., Tong, X., Zhao, X., Li, M. (2017). CP-ABE Based Access Control for Cloud Storage. In: Balas, V., Jain, L., Zhao, X. (eds) Information Technology and Intelligent Transportation Systems. Advances in Intelligent Systems and Computing, vol 455. Springer, Cham. https://doi.org/10.1007/978-3-319-38771-0_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-38771-0_45

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-38769-7

  • Online ISBN: 978-3-319-38771-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics