Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization
نویسندگان
چکیده
The increasing popularity of remote Cloud File Sharing (CFS) has become a major concern for privacy breach sensitive data. Aiming at this concern, we present new resource sharing framework by integrating enterprise-side Attribute-Based Access Control/eXtensible Control Markup Language (ABAC/XACML) model, client-side Ciphertext-Policy Encryption (CP-ABE) scheme, and cloud-side CFS service. Moreover, the workflow is provided to support encrypted-file writing reading algorithms in accordance with ABAC/XACML-based access policy attribute credentials. However, an actual problem realizing that matrix, derived from policy, seriously affects performance existing CP-ABE Lattice (CP-ABE-L) schemes. To end it, optimal generation algorithm Small Policy Matrix (SPM), which only consists small elements, generates all-one reconstruction vector. Based on such improved CP-ABE-L scheme proposed reduce cumulative errors minimum prevent enlargement error bounds. Furthermore, give estimation system parameters implement valid Error Proportion Allocation (EPA). Our experimental results indicate our short size enjoys efficient computation storage overloads. Thus, optimization methods conducive enhancing security efficiency work CFS.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملAttribute Based Secure Data Access in Cloud Computing
Cloud computing enables highly scalable services to be easily consumed over the Internet on an asneeded basis. Attribute Based Secure Data Access has proposed for access control of outsourced data in cloud computing. The person wants to sale their business logic to some others with attractive mechanism for showing the restricted portion. The idea proposed the business people have secure Uploadi...
متن کاملSecure Information Sharing Using Attribute Certificates and Role Based Access Control
In this paper, we explore the issues involved with the design and rapid deployment of large scale secure information sharing (SIS) systems for coordination involved with multiple agencies. Procedures and tools were developed for setting up quickly the public key infrastructure (PKI) and privilege management infrastructure (PMI) for the multi-agency SIS systems. A multi-agency SIS testbed based ...
متن کاملA Policy Based Access Control and Assured File Deletion for Secure Cloud Storage
Security guarantees are essential for the outsourced data, wh ich is maintained by third party cloud storage. To achieve s ecurity gu arantees f or t he out sourced data ba ckups, we design and implement a secure overlay cloud storage system called FADE. FADE achieves fine-grained, policy-based access control and file assured deletion. I t associates outsourced files with file access policies, ...
متن کاملk-Times Attribute-Based Anonymous Access Control for Cloud Computing
In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In additi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Cloud Computing
سال: 2023
ISSN: ['2168-7161', '2372-0018']
DOI: https://doi.org/10.1109/tcc.2021.3104323