TY - GEN
T1 - Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems
AU - Zhao, Fangming
AU - Nishide, Takashi
AU - Sakurai, Kouichi
PY - 2011/5/26
Y1 - 2011/5/26
N2 - We consider the problem of constructing a secure cloud storage service to which users outsource sensitive data for sharing with others where, in particular, the service provider is not completely trusted by the customer. Cloud storage service denotes an architectural shift toward thin clients and conveniently centralized provision of both computing and storage resources. When utilizing cloud storage for secure data sharing, one of the main motivating problems of this architecture is providing thin clients with both strong data confidentiality and flexible fine-grained access control without imposing additional cost on them (clients). To achieve this goal, we propose a novel data sharing protocol by combining and exploiting two of the latest attribute based cryptographic techniques, attribute-based encryption (ABE) and attribute-based signature (ABS). Furthermore, we also give a detailed comparison of our scheme with several latest existing schemes.
AB - We consider the problem of constructing a secure cloud storage service to which users outsource sensitive data for sharing with others where, in particular, the service provider is not completely trusted by the customer. Cloud storage service denotes an architectural shift toward thin clients and conveniently centralized provision of both computing and storage resources. When utilizing cloud storage for secure data sharing, one of the main motivating problems of this architecture is providing thin clients with both strong data confidentiality and flexible fine-grained access control without imposing additional cost on them (clients). To achieve this goal, we propose a novel data sharing protocol by combining and exploiting two of the latest attribute based cryptographic techniques, attribute-based encryption (ABE) and attribute-based signature (ABS). Furthermore, we also give a detailed comparison of our scheme with several latest existing schemes.
UR - http://www.scopus.com/inward/record.url?scp=79956336417&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79956336417&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-21031-0_7
DO - 10.1007/978-3-642-21031-0_7
M3 - Conference contribution
AN - SCOPUS:79956336417
SN - 9783642210303
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 83
EP - 97
BT - Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings
T2 - 7th International Conference on Information Security Practice and Experience, ISPEC 2011
Y2 - 30 May 2011 through 1 June 2011
ER -