A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing

Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

The benefits of cloud computing motivate enterprises to migrate their IT infrastructure on cloud servers. Enterprise needs to entrust untrusted cloud service provider, which gives rise to various security and privacy concerns. To address these concerns, numerous schemes in cloud computing employed attribute-based encryption schemes. However, existing schemes are neither flexible enough to provide users complete liberty on delegation of their access privileges nor grant shared access privileges among users of a group to jointly address a responsibility. This paper introduces hierarchical attribute-set-based access control scheme by employing ciphertext-policy attribute-set-based encryption with a hierarchical structure of users to achieve scalability. The proposed scheme simultaneously achieves the notion of fine-grained cum flexible access control, privacy preserving, efficient data utilization and imperatively provides users full-fledged liberty on delegation of their access privileges. Furthermore, we formally prove that proposed scheme is secure under decisional bilinear Diffie–Hellman assumption.

Original languageEnglish
Pages (from-to)241-256
Number of pages16
JournalComputers and Electrical Engineering
Volume57
DOIs
Publication statusPublished - Jan 1 2017

Fingerprint

Cloud computing
Access control
Cryptography
Scalability
Industry
Servers

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)
  • Electrical and Electronic Engineering

Cite this

A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing. / Ahuja, Rohit; Mohanty, Sraban Kumar; Sakurai, Kouichi.

In: Computers and Electrical Engineering, Vol. 57, 01.01.2017, p. 241-256.

Research output: Contribution to journalArticle

@article{c636fb6f7005415197e4e3e26b5e9521,
title = "A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing",
abstract = "The benefits of cloud computing motivate enterprises to migrate their IT infrastructure on cloud servers. Enterprise needs to entrust untrusted cloud service provider, which gives rise to various security and privacy concerns. To address these concerns, numerous schemes in cloud computing employed attribute-based encryption schemes. However, existing schemes are neither flexible enough to provide users complete liberty on delegation of their access privileges nor grant shared access privileges among users of a group to jointly address a responsibility. This paper introduces hierarchical attribute-set-based access control scheme by employing ciphertext-policy attribute-set-based encryption with a hierarchical structure of users to achieve scalability. The proposed scheme simultaneously achieves the notion of fine-grained cum flexible access control, privacy preserving, efficient data utilization and imperatively provides users full-fledged liberty on delegation of their access privileges. Furthermore, we formally prove that proposed scheme is secure under decisional bilinear Diffie–Hellman assumption.",
author = "Rohit Ahuja and Mohanty, {Sraban Kumar} and Kouichi Sakurai",
year = "2017",
month = "1",
day = "1",
doi = "10.1016/j.compeleceng.2016.11.028",
language = "English",
volume = "57",
pages = "241--256",
journal = "Computers and Electrical Engineering",
issn = "0045-7906",
publisher = "Elsevier Limited",

}

TY - JOUR

T1 - A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing

AU - Ahuja, Rohit

AU - Mohanty, Sraban Kumar

AU - Sakurai, Kouichi

PY - 2017/1/1

Y1 - 2017/1/1

N2 - The benefits of cloud computing motivate enterprises to migrate their IT infrastructure on cloud servers. Enterprise needs to entrust untrusted cloud service provider, which gives rise to various security and privacy concerns. To address these concerns, numerous schemes in cloud computing employed attribute-based encryption schemes. However, existing schemes are neither flexible enough to provide users complete liberty on delegation of their access privileges nor grant shared access privileges among users of a group to jointly address a responsibility. This paper introduces hierarchical attribute-set-based access control scheme by employing ciphertext-policy attribute-set-based encryption with a hierarchical structure of users to achieve scalability. The proposed scheme simultaneously achieves the notion of fine-grained cum flexible access control, privacy preserving, efficient data utilization and imperatively provides users full-fledged liberty on delegation of their access privileges. Furthermore, we formally prove that proposed scheme is secure under decisional bilinear Diffie–Hellman assumption.

AB - The benefits of cloud computing motivate enterprises to migrate their IT infrastructure on cloud servers. Enterprise needs to entrust untrusted cloud service provider, which gives rise to various security and privacy concerns. To address these concerns, numerous schemes in cloud computing employed attribute-based encryption schemes. However, existing schemes are neither flexible enough to provide users complete liberty on delegation of their access privileges nor grant shared access privileges among users of a group to jointly address a responsibility. This paper introduces hierarchical attribute-set-based access control scheme by employing ciphertext-policy attribute-set-based encryption with a hierarchical structure of users to achieve scalability. The proposed scheme simultaneously achieves the notion of fine-grained cum flexible access control, privacy preserving, efficient data utilization and imperatively provides users full-fledged liberty on delegation of their access privileges. Furthermore, we formally prove that proposed scheme is secure under decisional bilinear Diffie–Hellman assumption.

UR - http://www.scopus.com/inward/record.url?scp=85007441098&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85007441098&partnerID=8YFLogxK

U2 - 10.1016/j.compeleceng.2016.11.028

DO - 10.1016/j.compeleceng.2016.11.028

M3 - Article

AN - SCOPUS:85007441098

VL - 57

SP - 241

EP - 256

JO - Computers and Electrical Engineering

JF - Computers and Electrical Engineering

SN - 0045-7906

ER -