Title :
KP-ABE Based Verifiable Cloud Access Control Scheme
Author :
Xiaolin Si ; Pengpian Wang ; Liwu Zhang
Author_Institution :
Inst. of Software, Beijing, China
Abstract :
With the rapid development of mobile internet, mobile devices are requiring more complex authorization policy to ensure an secure access control on mobile data. However mobiles have limited resources (computing, storage, etc.) and are not suitable to execute complex operations. Cloud computing is an increasingly popular paradigm for accessing powerful computing resources. Intuitively we can solve that problem by moving the complex access control process to the cloud and implement a fine-grained access control relying on the powerful cloud. However the cloud computation may not be trusted, a crucial problem is how to verify the correctness of such computations. In this paper, we proposed a public verifiable cloud access control scheme based on Parno´s public verifiable computation protocol. For the first time, we proposed the conception and concrete construction of verifiable cloud access control. Specifically, we firstly design a user private key revocable Key Policy Attribute Based Encryption (KP-ABE) scheme with non-monotonic access structure, which can be combined with the XACML policy perfectly. Secondly we convert the XACML policy into the access structure of KP-ABE. Finally we construct a security provable public verifiable cloud access control scheme based on the KP-ABE scheme we designed.
Keywords :
authorisation; cloud computing; mobile computing; private key cryptography; KP-ABE scheme; XACML policy; authorization policy; cloud computing; mobile Internet; mobile devices; nonmonotonic access structure; public verifiable cloud access control scheme; public verifiable computation protocol; user private key revocable key policy attribute based encryption scheme; Access control; Cloud computing; Encoding; Games; Public key; KP-ABE; XACML; access control; cloud computing; verifiable computation;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
DOI :
10.1109/TrustCom.2013.68