Abstract
Cloud computing has emerged as the most influential paradigm in recent years. The new computing technology requires users to entrust their data to the cloud provider, which leads to security issues on the outsourced data. In order to achieve scalable, fine-grained and flexible access control for cloud computing, we extends Ciphertext-Policy Attribute-Set-Based Encryption (CP-ASBE) by building in a hierarchical structure to obtain Hierarchical Attribute-Set-Based Encryption (HASBE) for cloud computing. The proposed scheme inherits flexibility in supporting compound attributes, and achieves scalability due to the hierarchical structure. More efficient user revocation is achieved because of the use of attribute-set which allows us incrementally update user’s expiration time. We analyze the proposed scheme, and it is showed that the scheme is not only efficient and flexible in dealing with access control for cloud computing, but also has the same security as CP-ASBE.
This work is supported in part by Scientific Foundation for Returned Overseas Chinese Scholars, Ministry of Education, and the National Natural Science Foundation of China under Grant No. 61003223.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Buyya, R., ShinYeo, C., Broberg, J., Brandic, I.: Cloud computing and emerging it platforms:vision, hype, and reality for delivering computing as the 5th utility. In: Future Generation Computer Systems, vol. 25 (2009)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attibute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security (ACM CCS) (2006)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (2007)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
Bobba, R., Khurana, H., Prabhakaran, M.: Attribute-sets: A practically motivated enhancement to attribute-based encryption. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 587–604. Springer, Heidelberg (2009)
Yu, S., Wang, C., Ren, K., Lou, W.: Achiving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE INFOCOM 2010, pp. 534–542 (2010)
Wang, G., Liu, Q., Wu, J.: Hierachical attibute-based encryption for fine-grained access control in cloud storage services. In: ACM Conference on Computer and Communications Security, ACM CCS (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, J., Wan, Z., Gu, M. (2011). Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing. In: Bao, F., Weng, J. (eds) Information Security Practice and Experience. ISPEC 2011. Lecture Notes in Computer Science, vol 6672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21031-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-21031-0_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21030-3
Online ISBN: 978-3-642-21031-0
eBook Packages: Computer ScienceComputer Science (R0)