首页 | 本学科首页   官方微博 | 高级检索  
     


Access control based privacy preserving secure data sharing with hidden access policies in cloud
Affiliation:1. Research Scholar, University of Kerala College of Engineering Trivandrum, India;2. IIITMK, Trivandrum, India;1. School of Information Science & Engineering, Shenyang Ligong University, Shenyang 110159, China;2. Department of Information & Communication Engineering, Hohai University, Changzhou 213022, China;3. Integrated Management Coastal Research Institute, Universidad Politecnica de Valencia, Valencia, Spain;1. University of North Texas, USA;2. AMD Research - Advanced Micro Devices, Inc., USA;1. Computer Engineering Department, Bogazici University, 34342, Istanbul, Turkey;2. Computer Engineering Department, Marmara University, 34722, Istanbul, Turkey;3. Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA 16802, USA
Abstract:Attribute-based encryption is a promising solution to the access control based data sharing in the cloud. In this scheme, access policies are being sent in plaintext form which discloses the user privacy and data privacy. Once the ciphertext has been shared among the set of authorized users they would be able to decrypt the ciphertext. Whenever the authorized users are acting as malicious users, they may alter the data and further encrypt and outsource the modified data. It may adversely affect the data owner. In the existing attribute-based encryption scheme, data owner’s authenticity cannot be verified. In order to resolve these problems, we are proposing a novel idea to anonymize the access policy and a signature scheme to verify the authenticity of data as well as that of the data owner. Anonymized access policy never discloses the privacy. The signature scheme is able to detect the insider attack on attribute-based encryption scheme. The proposed system is secure against indistinguishable chosen-ciphertext attack. It is a provably secure and existentially unforgeable access control based data sharing method in the public cloud.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号