skip to main content
10.1145/2484402.2484404acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
keynote

Secure access to outsourced data

Published:08 May 2013Publication History

ABSTRACT

Traditionally, access controls to data are enforced by employing trusted servers to store data and mediate access control. However, services are increasingly storing data across many servers shared with other data owners. An example of this is cloud computing which has the great potential of providing various services to the society at significantly reduced cost due to aggregated management of elastic resources. Since software systems are not guaranteed to be bug-free and hardware platforms are not under direct control of data owners in such distributed systems, security risks are abundant. To mitigate users' privacy concern about their data, a common solution is to outsource data in encrypted form so that it will remain private even if data servers are not trusted or compromised. The encrypted data, however, must be amenable to sharing and access control. In this keynote, I will discuss various security issues related to outsourced data storage and provide an overview of emerging solutions for realizing secure access to encrypted data in untrusted servers.

References

  1. V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of ACM Conference on Computer and Communications Security, pages 89--98, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Proceedings of EUROCRYPT, pages 146--162, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Lai, R. H. Deng, and Y. Li. Fully secure cipertext-policy hiding CP-ABE. In Proceedings of ISPEC, pages 24--39, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In Proceedings of EUROCRYPT, pages 62--91, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Li, K. Ren, B. Zhu, and Z. Wan. Privacy-aware attribute based encryption with user accountability. In Proceedings of ISC, pages 347--362, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. T. Nishide, K. Yoneyama, and K. Ohta. Attribute-based encryption with partially hidden encryptor-specifed access structures. In Proceedings of ACNS, pages 111--129, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Green, S. Hohenberger, B. Waters. Outsourcing the decryption of ABE ciphertexts. In Proceedings of USENIX Security Symposium, pages 523--538, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Lai, R. H. Deng and Y. Li, Expressive CP-ABE with partially hidden access structures. In Proceedings of AsiaCCS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Secure access to outsourced data

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          Cloud Computing '13: Proceedings of the 2013 international workshop on Security in cloud computing
          May 2013
          78 pages
          ISBN:9781450320672
          DOI:10.1145/2484402
          • General Chair:
          • Xingming Sun,
          • Program Chairs:
          • Elaine Shi,
          • Kui Ren

          Copyright © 2013 Author

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 May 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • keynote

          Acceptance Rates

          Cloud Computing '13 Paper Acceptance Rate9of18submissions,50%Overall Acceptance Rate9of18submissions,50%
        • Article Metrics

          • Downloads (Last 12 months)5
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader