TY - JOUR
T1 - A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing
AU - Ahuja, Rohit
AU - Mohanty, Sraban Kumar
AU - Sakurai, Kouichi
PY - 2017/1/1
Y1 - 2017/1/1
N2 - The benefits of cloud computing motivate enterprises to migrate their IT infrastructure on cloud servers. Enterprise needs to entrust untrusted cloud service provider, which gives rise to various security and privacy concerns. To address these concerns, numerous schemes in cloud computing employed attribute-based encryption schemes. However, existing schemes are neither flexible enough to provide users complete liberty on delegation of their access privileges nor grant shared access privileges among users of a group to jointly address a responsibility. This paper introduces hierarchical attribute-set-based access control scheme by employing ciphertext-policy attribute-set-based encryption with a hierarchical structure of users to achieve scalability. The proposed scheme simultaneously achieves the notion of fine-grained cum flexible access control, privacy preserving, efficient data utilization and imperatively provides users full-fledged liberty on delegation of their access privileges. Furthermore, we formally prove that proposed scheme is secure under decisional bilinear Diffie–Hellman assumption.
AB - The benefits of cloud computing motivate enterprises to migrate their IT infrastructure on cloud servers. Enterprise needs to entrust untrusted cloud service provider, which gives rise to various security and privacy concerns. To address these concerns, numerous schemes in cloud computing employed attribute-based encryption schemes. However, existing schemes are neither flexible enough to provide users complete liberty on delegation of their access privileges nor grant shared access privileges among users of a group to jointly address a responsibility. This paper introduces hierarchical attribute-set-based access control scheme by employing ciphertext-policy attribute-set-based encryption with a hierarchical structure of users to achieve scalability. The proposed scheme simultaneously achieves the notion of fine-grained cum flexible access control, privacy preserving, efficient data utilization and imperatively provides users full-fledged liberty on delegation of their access privileges. Furthermore, we formally prove that proposed scheme is secure under decisional bilinear Diffie–Hellman assumption.
UR - http://www.scopus.com/inward/record.url?scp=85007441098&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85007441098&partnerID=8YFLogxK
U2 - 10.1016/j.compeleceng.2016.11.028
DO - 10.1016/j.compeleceng.2016.11.028
M3 - Article
AN - SCOPUS:85007441098
SN - 0045-7906
VL - 57
SP - 241
EP - 256
JO - Computers and Electrical Engineering
JF - Computers and Electrical Engineering
ER -