A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow
نویسندگان
چکیده
With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable keypolicy attribute-based encryption without key escrow (WOKE-AKPABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks. Keywords—Cloud storage security, sharing storage, attributes, Hash algorithm.
منابع مشابه
Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation
Nowadays, more and more users store their data in cloud storage servers for great convenience and real benefits offered by the service, so cloud data storage becomes one of the desirable services provided by cloud service providers. Multi-Authority Ciphertext-Policy Attribute-Based Encryption (MA-CP-ABE) is an emerging cryptographic solution to data access control for large-scale collaborative ...
متن کاملMitigating Key Escrow in Attribute-Based Encryption
The notion of accountable authority introduced by Goyal (Crypto 2007) in identity-based encryption (IBE) setting is a novel approach to mitigate the (inherent) key escrow problem in identity based cryptosystems. As far as we know, the (inherent) key escrow problem also exists in attribute based encryption (ABE), for example ciphertext policy ABE (CP-ABE). In this paper, the concept of accountab...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملExperimental Evaluation to Enhance Security for Health Care System Using Cloud Computing and Near Field Communication
Developed countries and increasingly mature society of the need to develop smart call in many health care facilities to deliver best medical facilities. Data sharing structure based systems such as online networks of Healthcare Application System has huge demands for distributed data security and efficiency. Use of NFC (Near Field Communication Technology) and proposed Cipher text policy attrib...
متن کاملAccountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
As a sophisticated mechanism for secure fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) is a highly promising solution for commercial applications such as cloud computing. However, there still exists one major issue awaiting to be solved, that is, the prevention of key abuse. Most of the existing CP-ABE systems missed this critical functionality, hindering the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016