DocumentCode :
40971
Title :
Privacy Preserving Policy-Based Content Sharing in Public Clouds
Author :
Nabeel, Mohamed ; Ning Shang ; Bertino, Elisa
Author_Institution :
Dept. of Comput. Sci., Purdue Univ., West Lafaytte, IN, USA
Volume :
25
Issue :
11
fYear :
2013
fDate :
Nov. 2013
Firstpage :
2602
Lastpage :
2614
Abstract :
An important problem in public clouds is how to selectively share documents based on fine-grained attribute-based access control policies (acps). An approach is to encrypt documents satisfying different policies with different keys using a public key cryptosystem such as attribute-based encryption, and/or proxy re-encryption. However, such an approach has some weaknesses: it cannot efficiently handle adding/revoking users or identity attributes, and policy changes; it requires to keep multiple encrypted copies of the same documents; it incurs high computational costs. A direct application of a symmetric key cryptosystem, where users are grouped based on the policies they satisfy and unique keys are assigned to each group, also has similar weaknesses. We observe that, without utilizing public key cryptography and by allowing users to dynamically derive the symmetric keys at the time of decryption, one can address the above weaknesses. Based on this idea, we formalize a new key management scheme, called broadcast group key management (BGKM), and then give a secure construction of a BGKM scheme called ACV-BGKM. The idea is to give some secrets to users based on the identity attributes they have and later allow them to derive actual symmetric keys based on their secrets and some public information. A key advantage of the BGKM scheme is that adding users/revoking users or updating acps can be performed efficiently by updating only some public information. Using our BGKM construct, we propose an efficient approach for fine-grained encryption-based access control for documents stored in an untrusted cloud file storage.
Keywords :
authorisation; cloud computing; data privacy; public key cryptography; ACV-BGKM; access control vector; acps; broadcast group key management; cloud file storage; content sharing; fine-grained attribute-based access control policies; finegrained encryption; identity attributes; key management scheme; privacy preserving policy; public clouds; public information; symmetric keys; Access control; Encryption; Privacy; Resistance; Vectors; Group key management; access control; cloud computing; encryption; identity; policy; privacy;
fLanguage :
English
Journal_Title :
Knowledge and Data Engineering, IEEE Transactions on
Publisher :
ieee
ISSN :
1041-4347
Type :
jour
DOI :
10.1109/TKDE.2012.180
Filename :
6298891
Link To Document :
بازگشت