Font Size: a A A

Research On Access Control Towards Attribute Revocation In Cloud Computing

Posted on:2015-03-18Degree:MasterType:Thesis
Country:ChinaCandidate:X X XieFull Text:PDF
GTID:2268330431964204Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
As cloud computing becomes prevalent, more and more sensitive data is being centralizedinto the cloud by users. The cloud is responsible for the management and maintenance of thestored data, and providing services that users need. By outsourcing their data in the cloud, userscan obtain high quality data storage services. Moreover, Other users can apply for access todata stored in the cloud. Thus, different users can achieve the purpose of sharing data with eachother. However, Under the circumstance of the cloud, the cloud couldn’t be trusted fully byusers. In addition, the users storing the data in the cloud wish that some illegal users couldn’tobtain the privilege of accessing the data. Therefore, how to design a secure access controlmechanism is becoming an urgent challenge in the case of sharing data. Access control allowslegitimate users to successfully access the data. And, in view of frequent change of users, it ispromising to introduce an access control construction towards the user and attribute revocation.The main points of this paper are as follows:1. The paper studied the existing attribute-based encryption schemes, and then summarizesthe disadvantages of the existing schemes. However, the disadvantages that we pay atten-tion to are mainly focus on efficiency with attribute revocation. Besides, other disadvan-tages are referred.2. Based on the honest-but-curious server model, in this paper, we propose a new and effi-cient access control scheme towards the user and attribute revocation, which not only isefficient on data encryption, but also is same on key update. Through rigorous securityanalysis, we show that our proposed scheme is secure under the proposed model, andcould realize efficient user and attribute revocation. On the basis of efficiency analysis,the results suggest that the proposed scheme is efficient.3. Based on scheme towards attribute revocation, we introduce problems of attribute revo-cation under another kind of service provider. Therefore, under the circumstances ofnew service provider model, to cope with collusion with service provider and user, weintroduce a simple scheme, which could prevent collusion attack.
Keywords/Search Tags:Cloud computing, Access control, Attribute revocation, Attribute-based encryption, fine-grained
PDF Full Text Request
Related items