Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud

Expand
  • (School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China)

Online published: 2018-10-07

Abstract

Cloud computing provides a wide platform for information sharing. Users can access data and retrieve service easily and quickly. Generally, the data in cloud are transferred with encrypted form to protect the information. As an important technology of cloud security, access control should take account of multi-factor and ciphertext to satisfy the complex requirement for cloud data protection. We propose a proxy re-encryption (PRE) based multi-factor access control (PMAC) for cipher text in the above background. The PMAC adapts to the privacy and the protection of data confidently. We explain the motivation and some assumptions of PMAC at first. Then we define system model and algorithm. The system model and algorithm show how to create the data with corresponding accessing policy and how to grant and revoke the permission.

Cite this article

SU Mang (苏铓), WANG Liangchen (汪良辰), FU Anmin (付安民), YU Yan (俞研) . Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud[J]. Journal of Shanghai Jiaotong University(Science), 2018 , 23(5) : 666 -670 . DOI: 10.1007/s12204-018-1962-5

References

[1] WANG Y D, YANG J H, XU C, et al. Survey on accesscontrol technologies for cloud computing [J]. Journalof Software, 2015, 26(5): 1129-1150 (in Chinese). [2] JHA S, SURAL S, VAIDYA J, et al. Security analysisof temporal RBAC under an administrative model [J].Computers & Security, 2014, 46: 154-172. [3] YANG L, TANG Z, LI R F, et al. Roles query algorithmin cloud computing environment based on userrequire [J]. Journal of Communications, 2010, 7(32):169-175 (in Chinese). [4] LUO J,WANG H J, GONG X, et al. A novel role-basedaccess control model in cloud environments [J]. InternationalJournal of Computational Intelligence Systems,2016, 9(1): 1-9. [5] LI J W, SQUICCIARINI A, LIN D, et al. SecLoc:Securing location-sensitive storage in the cloud[C]//Proceedings of the 20th ACM Symposium on AccessControl Models and Technologies. Vienna, Austria:ACM, 2015: 51-61. [6] ZHOU L, VARADHARAJAN V, HITCHENS M.Trust enhanced cryptographic role-based access controlfor secure cloud data storage [J]. IEEE Transactionson Information Forensics and Security, 2015,10(11): 2381-2395. [7] ZHOU L, VARADHARAJAN V, GOPINATH K. Asecure role-based cloud storage system for encryptedpatient-centric health records [J]. The Computer Journal,2016, 59(11): 1593-1611. [8] XU P, JIAO T F, WU Q H, et al. Conditional identitybasedbroadcast proxy re-encryption and its applicationto cloud email [J]. IEEE Transactions on Computers,2016, 65(1): 66-79. [9] ZHANG Y H, LI J, CHEN X F, et al. Anonymousattribute based proxy re-encryption for access controlin cloud computing [J]. Security and CommunicationNetworks, 2016, 9(14): 2397-2411. [10] LI J G, ZHAO X X, ZHANG Y C, et al. Provably securecertificate-based conditional proxy re-encryption[J]. Journal of Information Science and Engineering,2016, 32(4): 813-830. [11] LIU Q, WANG G J, WU J. Time-based proxy reencryptionscheme for secure data sharing in a cloudenvironment [J]. Information Sciences, 2014, 258(3):355-370. [12] YANG Y J, LU H B,WENG J, et al. Fine-grained conditionalproxy re-encryption and application [J]. LectureNotes in Computer Science, 2014, 8782: 206-222. [13] TANG Q. Type-based proxy re-encryption and its construction[J]. Lecture Notes in Computer Science, 2008,5365: 130-144. [14] SU M, SHI G Z, XIE R N, et al. Multi-element basedon proxy re-encryption scheme for mobile cloud computing[J]. Journal of Communications, 2015, 36(11):73-79 (in Chinese). [15] SU M, LI F H, SHI G Z, et al. A user-centric datasecure creation scheme in cloud computing [J]. ChineseJournal of Electronics, 2016, 25(4): 753-760.
Options
Outlines

/