Efficient Revocation for Multi-Authority Cloud Storage Systems

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2017 by IJCOT Journal
Volume - 7 Issue - 3
Year of Publication : 2017
Authors :  Noor U Sabha, Sriraksha T A, Shivaraj Kumar T H

Citation

Noor U Sabha, Sriraksha T A, Shivaraj Kumar T H "Efficient Revocation for Multi-Authority Cloud Storage Systems", International Journal of Computer & organization Trends (IJCOT), V7(3):13-15 May - Jun 2017, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract

Due to the high volume and velocity of big data, it is an effective option to store big data in the cloud, as the cloud has capabilities of storing big data and processing high volume of user access requests. Attribute-Based Encryption (ABE) is a promising technique to ensure the end-to-end security of big data in the cloud. However, the policy updating has always been a challenging issue when ABE is used to construct access control schemes. A trivial implementation is to let data owners retrieve the data and re-encrypt it under the new access policy, and then send it back to the cloud. This method, however, incurs a high communication overhead and heavy computation burden on data owners. A novel scheme is proposed that enable efficient access control with dynamic policy updating for big data in the cloud. Developing an outsourced policy updating method for ABE systems is focused. This method can avoid the transmission of encrypted data and minimize the computation work of data owners, by making use of the previously encrypted data with old access policies. Policy updating algorithms is proposed for different types of access policies. An efficient and secure method is proposed that allows data owner to check whether the cloud server has updated the ciphertexts correctly.

References

[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and Z. Matei. A view of cloud computing. Communications of the ACM, 53(4):50–58, 2010.
[2] K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie. DAC-MACS: Effective data access control for multi-authority cloud storage systems. IEEE Transactions on Information Forensics & Security, 8(11):2895–2903, 2013.
[3] X. Chen, J. Li, X. Huang, J. Ma, and W. Lou. New publicly verifiable databases with efficient updates. IEEE Transactions on Dependable and Secure Computing, 12(5):546–556, 2015.
[4] K. Ren, C. Wang, and Q. Wang. Security challenges for the public cloud. IEEE Internet Computing, 16(1):69–73, 2012.
[5] S. Subashiniand V. Kavitha. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1):1 – 11, 2011.
[6] S. Kamara and K. Lauter. Cryptographic cloud storage. In Proceedings of the 1st Workshop on Real-Life Cryptographic Protocols and Standardization(RLCPS’2010), volume 6054 of Lecture Notes in Computer Science, pages 136–149, Berlin, Heidelberg, 2010. Springer-Verlag.
[7] X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou. New algorithms for secure outsourcing of modular exponentiations. IEEE Transactions on Parallel and Distributed Systems, 25(9):2386– 2396, 2014.
[8] D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In Advances in Cryptology-CRYPTO’2001, volume 2139 of Lecture Notes in Computer Science, pages 213–229, Berlin, Heidelberg, 2001. Springer-Verlag.
[9] A. Sahai and B. Waters. Fuzzy identity-based encryption. In Advances in Cryptology-EUROCRYPT’2005, volume 3494 of Lecture Notes in Computer Science, pages 457–473. Springer Heidelberg, 2005.
[10] V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attributebased encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security(CCS’2006), pages 89–98. ACM, 30 October - 3 November 2006.
[11] J. Hur and D. K. Noh.Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems, 22(7):1214– 1221, 2011.
[12] J. Lai, R. H. Deng, C. Guan, and J. Weng. Attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 8(8):1343– 1354, 2013.
[13] K. Yang, X. Jia, and K. Ren. Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security(ASIACCS’2013), pages 523–528, New York, NY, USA, 2013. ACM.
[14] S. Yu, C. Wang, K. Ren, and W. Lou. Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security(ASIACCS’2010),pages 261–270, New York, NY, USA, 2010. ACM.
[15] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute based encryption. In Proceedings of the 2007 IEEE Symposium on Security and Privacy(S&P’2007), pages 321–334. IEEE, 20-23 May 2007.

Keywords
Attribute-based encryption; multiauthority cloud storage; attribute-level revocation; user-level revocation.