Skip to main content

Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6672))

Abstract

Cloud computing has emerged as the most influential paradigm in recent years. The new computing technology requires users to entrust their data to the cloud provider, which leads to security issues on the outsourced data. In order to achieve scalable, fine-grained and flexible access control for cloud computing, we extends Ciphertext-Policy Attribute-Set-Based Encryption (CP-ASBE) by building in a hierarchical structure to obtain Hierarchical Attribute-Set-Based Encryption (HASBE) for cloud computing. The proposed scheme inherits flexibility in supporting compound attributes, and achieves scalability due to the hierarchical structure. More efficient user revocation is achieved because of the use of attribute-set which allows us incrementally update user’s expiration time. We analyze the proposed scheme, and it is showed that the scheme is not only efficient and flexible in dealing with access control for cloud computing, but also has the same security as CP-ASBE.

This work is supported in part by Scientific Foundation for Returned Overseas Chinese Scholars, Ministry of Education, and the National Natural Science Foundation of China under Grant No. 61003223.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Buyya, R., ShinYeo, C., Broberg, J., Brandic, I.: Cloud computing and emerging it platforms:vision, hype, and reality for delivering computing as the 5th utility. In: Future Generation Computer Systems, vol. 25 (2009)

    Google Scholar 

  2. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attibute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security (ACM CCS) (2006)

    Google Scholar 

  3. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (2007)

    Google Scholar 

  4. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Bobba, R., Khurana, H., Prabhakaran, M.: Attribute-sets: A practically motivated enhancement to attribute-based encryption. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 587–604. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  6. Yu, S., Wang, C., Ren, K., Lou, W.: Achiving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE INFOCOM 2010, pp. 534–542 (2010)

    Google Scholar 

  7. Wang, G., Liu, Q., Wu, J.: Hierachical attibute-based encryption for fine-grained access control in cloud storage services. In: ACM Conference on Computer and Communications Security, ACM CCS (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, J., Wan, Z., Gu, M. (2011). Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing. In: Bao, F., Weng, J. (eds) Information Security Practice and Experience. ISPEC 2011. Lecture Notes in Computer Science, vol 6672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21031-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21031-0_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21030-3

  • Online ISBN: 978-3-642-21031-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics