A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing

Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai

研究成果: ジャーナルへの寄稿記事

5 引用 (Scopus)

抄録

The benefits of cloud computing motivate enterprises to migrate their IT infrastructure on cloud servers. Enterprise needs to entrust untrusted cloud service provider, which gives rise to various security and privacy concerns. To address these concerns, numerous schemes in cloud computing employed attribute-based encryption schemes. However, existing schemes are neither flexible enough to provide users complete liberty on delegation of their access privileges nor grant shared access privileges among users of a group to jointly address a responsibility. This paper introduces hierarchical attribute-set-based access control scheme by employing ciphertext-policy attribute-set-based encryption with a hierarchical structure of users to achieve scalability. The proposed scheme simultaneously achieves the notion of fine-grained cum flexible access control, privacy preserving, efficient data utilization and imperatively provides users full-fledged liberty on delegation of their access privileges. Furthermore, we formally prove that proposed scheme is secure under decisional bilinear Diffie–Hellman assumption.

元の言語英語
ページ(範囲)241-256
ページ数16
ジャーナルComputers and Electrical Engineering
57
DOI
出版物ステータス出版済み - 1 1 2017

Fingerprint

Cloud computing
Access control
Cryptography
Scalability
Industry
Servers

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)
  • Electrical and Electronic Engineering

これを引用

A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing. / Ahuja, Rohit; Mohanty, Sraban Kumar; Sakurai, Kouichi.

:: Computers and Electrical Engineering, 巻 57, 01.01.2017, p. 241-256.

研究成果: ジャーナルへの寄稿記事

@article{c636fb6f7005415197e4e3e26b5e9521,
title = "A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing",
abstract = "The benefits of cloud computing motivate enterprises to migrate their IT infrastructure on cloud servers. Enterprise needs to entrust untrusted cloud service provider, which gives rise to various security and privacy concerns. To address these concerns, numerous schemes in cloud computing employed attribute-based encryption schemes. However, existing schemes are neither flexible enough to provide users complete liberty on delegation of their access privileges nor grant shared access privileges among users of a group to jointly address a responsibility. This paper introduces hierarchical attribute-set-based access control scheme by employing ciphertext-policy attribute-set-based encryption with a hierarchical structure of users to achieve scalability. The proposed scheme simultaneously achieves the notion of fine-grained cum flexible access control, privacy preserving, efficient data utilization and imperatively provides users full-fledged liberty on delegation of their access privileges. Furthermore, we formally prove that proposed scheme is secure under decisional bilinear Diffie–Hellman assumption.",
author = "Rohit Ahuja and Mohanty, {Sraban Kumar} and Kouichi Sakurai",
year = "2017",
month = "1",
day = "1",
doi = "10.1016/j.compeleceng.2016.11.028",
language = "English",
volume = "57",
pages = "241--256",
journal = "Computers and Electrical Engineering",
issn = "0045-7906",
publisher = "Elsevier Limited",

}

TY - JOUR

T1 - A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing

AU - Ahuja, Rohit

AU - Mohanty, Sraban Kumar

AU - Sakurai, Kouichi

PY - 2017/1/1

Y1 - 2017/1/1

N2 - The benefits of cloud computing motivate enterprises to migrate their IT infrastructure on cloud servers. Enterprise needs to entrust untrusted cloud service provider, which gives rise to various security and privacy concerns. To address these concerns, numerous schemes in cloud computing employed attribute-based encryption schemes. However, existing schemes are neither flexible enough to provide users complete liberty on delegation of their access privileges nor grant shared access privileges among users of a group to jointly address a responsibility. This paper introduces hierarchical attribute-set-based access control scheme by employing ciphertext-policy attribute-set-based encryption with a hierarchical structure of users to achieve scalability. The proposed scheme simultaneously achieves the notion of fine-grained cum flexible access control, privacy preserving, efficient data utilization and imperatively provides users full-fledged liberty on delegation of their access privileges. Furthermore, we formally prove that proposed scheme is secure under decisional bilinear Diffie–Hellman assumption.

AB - The benefits of cloud computing motivate enterprises to migrate their IT infrastructure on cloud servers. Enterprise needs to entrust untrusted cloud service provider, which gives rise to various security and privacy concerns. To address these concerns, numerous schemes in cloud computing employed attribute-based encryption schemes. However, existing schemes are neither flexible enough to provide users complete liberty on delegation of their access privileges nor grant shared access privileges among users of a group to jointly address a responsibility. This paper introduces hierarchical attribute-set-based access control scheme by employing ciphertext-policy attribute-set-based encryption with a hierarchical structure of users to achieve scalability. The proposed scheme simultaneously achieves the notion of fine-grained cum flexible access control, privacy preserving, efficient data utilization and imperatively provides users full-fledged liberty on delegation of their access privileges. Furthermore, we formally prove that proposed scheme is secure under decisional bilinear Diffie–Hellman assumption.

UR - http://www.scopus.com/inward/record.url?scp=85007441098&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85007441098&partnerID=8YFLogxK

U2 - 10.1016/j.compeleceng.2016.11.028

DO - 10.1016/j.compeleceng.2016.11.028

M3 - Article

AN - SCOPUS:85007441098

VL - 57

SP - 241

EP - 256

JO - Computers and Electrical Engineering

JF - Computers and Electrical Engineering

SN - 0045-7906

ER -