Key-policy Attribute Based Encryption to Secure Data Stored in Cloud
نویسندگان
چکیده
As more sensitive data is shared and stored by third-party sites on the Internet, the data in these sites will need to encrypt. The main drawback of encrypting data is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We progress a new cryptosystem for fine-grained sharing of reencrypted data that we call Key-Policy Attribute-Based Encryption (KP-ABE). In our cryptosystem, cipher texts are labeled with sets of attributes and private keys are associated with access structures that control which cipher texts a user is able to decrypt. We explain the applicability of our construction to sharing of audit-log information and broadcast re-encryption with TPA(third Party Auditor). Our analysis supports delegation of private keys which subsumes Hierarchical Identity-Based Re-Encryption (HIBR).
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملAttribute based Encryption and Key Distribution for Secure Storage in Clouds
A new decentralized access control scheme is used for secure data storage in clouds that supports anonymous authentication. According to this scheme a user can create a file and store it securely in the cloud. Decryption will only work if the attributes associated with the decryption key match the policy used to encrypt the message. The cloud verifies the authenticity of the users without knowi...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملMulti-Owner Data Sharing in Cloud Storage Using Policy Based Encryption
Cloud storages are generally hosted by third parties where data can be stored and shared. Cloud storage provides virtualized pools of storage and people buy or lease storage capacity from them. The security of data is major problem when people use commercial cloud services to store their data. To avoid unauthorized access, data should be encrypted before outsourcing. Instead of attribute based ...
متن کاملData Storage Using Decentralized Access Control With Multiple Authentication in Clouds
Cloud computing reaches enormous growth in an Internet-Based development and so privacy and security are the most important issues. In this paper, we propose a new decentralized access control scheme with multiple KDC’s for securing data stored in cloud. In proposed scheme, the cloud provides the anonymous authenticity of the user through Third party auditor. Moreover, we implemented safe stora...
متن کامل