[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Achieving fine-grained access control for secure data sharing on cloud servers

Published: 01 August 2011 Publication History

Abstract

With more and more enterprises sharing their sensitive data on cloud servers, building a secure cloud environment for data sharing has attracted a lot of attention in both the industry and academic communities. In this paper, we propose a conjunctive precise and fuzzy identity-based encryption (PFIBE) scheme for secure data sharing on cloud servers, which allows the encryption of data by specifying a recipient identity (ID) set or a disjunctive normal form (DNF) access control policy over attributes, so that only the user whose ID belongs to the ID set or attributes satisfy the DNF access control policy can decrypt the corresponding data. Our design goal is to propose a novel encryption scheme, which simultaneously achieves a fine-grained access control, flexibility, high performance, and full key delegation, so as to help enterprise users to enjoy more secure, comprehensive, and flexible services. We achieve this goal by first combining the hierarchical identity-based encryption (HIBE) system and the ciphertext-policy attribute-based encryption (CP-ABE) system, and then marking each user with both an ID and a set of descriptive attributes, finally separating the access control policy into two parts: a recipient ID set and a DNF attribute-based access control policy. Copyright © 2011 John Wiley & Sons, Ltd.

Cited By

View all
  • (2024)Secure and Flexible Data Sharing With Dual Privacy Protection in Vehicular Digital Twin NetworksIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2024.336834225:9(12407-12420)Online publication date: 6-Mar-2024
  • (2019)Computing over encrypted spatial data generated by IoTTelecommunications Systems10.1007/s11235-018-0479-470:2(193-229)Online publication date: 1-Feb-2019
  • (2018)A new technique for data encryption based on third party encryption server to maintain the privacy preserving in the cloud environmentInternational Journal of Business Information Systems10.1504/IJBIS.2018.09365428:4(393-403)Online publication date: 1-Jan-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Concurrency and Computation: Practice & Experience
Concurrency and Computation: Practice & Experience  Volume 23, Issue 12
August 2011
154 pages
ISSN:1532-0626
EISSN:1532-0634
Issue’s Table of Contents

Publisher

John Wiley and Sons Ltd.

United Kingdom

Publication History

Published: 01 August 2011

Author Tags

  1. cloud computing
  2. precise and fuzzy identity-based encryption
  3. secure storage

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Secure and Flexible Data Sharing With Dual Privacy Protection in Vehicular Digital Twin NetworksIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2024.336834225:9(12407-12420)Online publication date: 6-Mar-2024
  • (2019)Computing over encrypted spatial data generated by IoTTelecommunications Systems10.1007/s11235-018-0479-470:2(193-229)Online publication date: 1-Feb-2019
  • (2018)A new technique for data encryption based on third party encryption server to maintain the privacy preserving in the cloud environmentInternational Journal of Business Information Systems10.1504/IJBIS.2018.09365428:4(393-403)Online publication date: 1-Jan-2018
  • (2017)Access control based privacy preserving secure data sharing with hidden access policies in cloudJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2017.03.00275:C(50-58)Online publication date: 1-Apr-2017
  • (2017)An Efficient Framework for Verifiable Access Control Based Dynamic Data Updates in Public Cloud13th International Conference on Distributed Computing and Internet Technology - Volume 1010910.1007/978-3-319-50472-8_12(147-158)Online publication date: 13-Jan-2017
  • (2016)Secure, efficient and revocable multi-authority access control system in cloud storageComputers and Security10.1016/j.cose.2016.02.00259:C(45-59)Online publication date: 1-Jun-2016
  • (2016)Time-bound key-aggregate encryption for cloud storageSecurity and Communication Networks10.1002/sec.14639:13(2059-2069)Online publication date: 10-Sep-2016
  • (2016)A fine-grained access control and revocation scheme on cloudsConcurrency and Computation: Practice & Experience10.1002/cpe.295628:6(1697-1714)Online publication date: 25-Apr-2016
  • (2015)Obfuscation for multi-use re-encryption and its application in cloud computingConcurrency and Computation: Practice & Experience10.1002/cpe.339927:8(2170-2190)Online publication date: 10-Jun-2015
  • (2015)A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public cloudsConcurrency and Computation: Practice & Experience10.1002/cpe.339727:8(2004-2027)Online publication date: 10-Jun-2015
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media