Title :
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
Author :
Yu, Shucheng ; Wang, Cong ; Ren, Kui ; Lou, Wenjing
Author_Institution :
Dept. of ECE, Worcester Polytech. Inst., Worcester, MA, USA
Abstract :
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensitive user data confidential against untrusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. However, in doing so, these solutions inevitably introduce a heavy computation overhead on the data owner for key distribution and data management when fine-grained data access control is desired, and thus do not scale well. The problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control actually still remains unresolved. This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine-grained data access control to untrusted cloud servers without disclosing the underlying data contents. We achieve this goal by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re-encryption. Our proposed scheme also has salient properties of user access privilege confidentiality and user secret key accountability. Extensive analysis shows that our proposed scheme is highly efficient and provably secure under existing security models.
Keywords :
Internet; authorisation; cryptography; Internet; attribute-based encryption techniques; cloud computing; cloud servers; cryptographic methods; data confidentiality; data decryption keys; data management; data security; fine-grained data access control; lazy reencryption; proxy reencryption; security models; Access control; Business; Cloud computing; Cryptography; Data security; Medical services; Memory; Service oriented architecture; Web and internet services; Web server;
Conference_Titel :
INFOCOM, 2010 Proceedings IEEE
Conference_Location :
San Diego, CA
Print_ISBN :
978-1-4244-5836-3
DOI :
10.1109/INFCOM.2010.5462174