Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

被引:753
作者
Yu, Shucheng [1 ]
Wang, Cong [2 ]
Ren, Kui [2 ]
Lou, Wenjing [1 ]
机构
[1] Worcester Polytech Inst, Dept ECE, Worcester, MA 01609 USA
[2] IIT, Dept ECE, Chicago, IL 60616 USA
来源
2010 PROCEEDINGS IEEE INFOCOM | 2010年
基金
美国国家科学基金会;
关键词
D O I
10.1109/INFCOM.2010.5462174
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensitive user data confidential against untrusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. However, in doing so, these solutions inevitably introduce a heavy computation overhead on the data owner for key distribution and data management when fine-grained data access control is desired, and thus do not scale well. The problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control actually still remains unresolved. This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine-grained data access control to untrusted cloud servers without disclosing the underlying data contents. We achieve this goal by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re-encryption. Our proposed scheme also has salient properties of user access privilege confidentiality and user secret key accountability. Extensive analysis shows that our proposed scheme is highly efficient and provably secure under existing security models.
引用
收藏
页数:9
相关论文
共 19 条
[1]  
Anderson James P., 1972, ESDTR7351
[2]  
[Anonymous], 1996, 104 US C HLTH INS PO
[3]  
Armbrust M, 2009, UCBEECS200928
[4]  
Atallah M.J., 2005, P ACM C COMPUTER COM, P190
[5]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[6]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[7]  
di Vimercati S.D. C., 2007, P 33 INT C VERY LARG, P123
[8]  
Goh E.jin., 2003, PROC NETWORK DISTRIB, P131
[9]  
Goyal V., 2006, ACM CCS 2006, P89, DOI DOI 10.1145/1180405.1180418
[10]  
Harney H., 2001, P NDSS 01