Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

INFOCOM(2010)

引用 2768|浏览426
暂无评分
摘要
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensitive user data confidential against untrusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. However, in doing so, these solutions inevitably introduce a heavy computation overhead on the data owner for key distribution and data management when fine-grained data access control is desired, and thus do not scale well. The problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control actually still remains unresolved. This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine-grained data access control to untrusted cloud servers without disclosing the underlying data contents. We achieve this goal by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re-encryption. Our proposed scheme also has salient properties of user access privilege confidentiality and user secret key accountability. Extensive analysis shows that our proposed scheme is highly efficient and provably secure under existing security models.
更多
查看译文
关键词
cloud servers,data owner,data confidentiality,cryptography,lazy reencryption,cryptographic methods,data security,proxy reencryption,sensitive user data,fine-grained data access control,attribute-based encryption techniques,data decryption keys,sensitive data,data attribute,authorisation,internet,data decryption key,security models,cloud computing,data management,underlying data content,access control,meteorology,key distribution,web server,servers,provable security,security model,business,public key,memory,service oriented architecture,data access,attribute based encryption
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要