Title :
Comments on “DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems”/Security Analysis of Attribute Revocation in Multiauthority Data Access Control for Cloud Storage Systems
Author :
Jianan Hong ; Kaiping Xue ; Wei Li
Author_Institution :
Dept. of Electr. Eng. & Inf. Sci., Univ. of Sci. & Technol. of China, Hefei, China
Abstract :
In the above paper, Yang et al. have proposed a multi-authority ciphertext-policy attribute-based encryption-based data access control for cloud storage, in which the authors claimed that the mechanism in dealing with attribute revocation could achieve both forward security and backward security. Unfortunately, our further analysis and investigation show that their work adopts a bidirectional re-encryption method in ciphertext updating, so a security vulnerability appears. Our proposed attack method demonstrates that a revoked user can still decrypt new ciphertexts that are claimed to require the new-version secret keys to decrypt.
Keywords :
authorisation; cloud computing; private key cryptography; storage management; attribute revocation; backward security; ciphertext updating; forward security; multiauthority ciphertext-policy attribute-based encryption-based data access control; multiauthority cloud storage systems; secret keys; security vulnerability; Access control; Cloud computing; Cryptography; Encryption; Storage management; Attribute Revocation; Attribute based Encryption; Attribute based encryption; Backward Security; Multi-Authority; attribute revocation; backward security; multi-authority;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2015.2407327