Attribute-based cloud storage with secure provenance over encrypted data
To securely and conveniently enjoy the benefits of cloud storage, it is desirable to design a cloud data storage system which protects data privacy from storage servers through encryption, allows fine-grained access control such that data providers can expressively specify who are eligible to access...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2018
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3899 https://ink.library.smu.edu.sg/context/sis_research/article/4901/viewcontent/1_s20_S0167739X17322835_main.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-4901 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-49012020-03-27T01:12:50Z Attribute-based cloud storage with secure provenance over encrypted data CUI, Hui DENG, Robert H. LI, Yingjiu To securely and conveniently enjoy the benefits of cloud storage, it is desirable to design a cloud data storage system which protects data privacy from storage servers through encryption, allows fine-grained access control such that data providers can expressively specify who are eligible to access the encrypted data, enables dynamic user management such that the total number of data users is unbounded and user revocation can be carried out conveniently, supports data provider anonymity and traceability such that a data provider’s identity is not disclosed to data users in normal circumstances but can be traced by a trusted authority if necessary, and equally important, provides secure data provenance by presenting irrefutable evidence on who has created and modified the data in the cloud. However, most of the existing cloud storage systems with secure provenance either lack the expressiveness in access control or incur too much performance overhead or do not support dynamic user management. In this paper, we solve these problems by presenting an attribute-based cloud storage system with secure provenance. We first give a simple construction without achieving user revocation, and then extend it with an efficient revocation mechanism to prevent revoked data users from accessing the newly encrypted data. Thereafter, we implement the algorithms in the proposed two constructions to evaluate their performance. Our experimental results show that the proposed systems are acceptable to be applied in practice. 2018-02-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3899 info:doi/10.1016/j.future.2017.10.010 https://ink.library.smu.edu.sg/context/sis_research/article/4901/viewcontent/1_s20_S0167739X17322835_main.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Cloud storage Secure provenance Access control Scalability Confidentiality Anonymity Traceability Revocation Databases and Information Systems Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Cloud storage Secure provenance Access control Scalability Confidentiality Anonymity Traceability Revocation Databases and Information Systems Information Security |
spellingShingle |
Cloud storage Secure provenance Access control Scalability Confidentiality Anonymity Traceability Revocation Databases and Information Systems Information Security CUI, Hui DENG, Robert H. LI, Yingjiu Attribute-based cloud storage with secure provenance over encrypted data |
description |
To securely and conveniently enjoy the benefits of cloud storage, it is desirable to design a cloud data storage system which protects data privacy from storage servers through encryption, allows fine-grained access control such that data providers can expressively specify who are eligible to access the encrypted data, enables dynamic user management such that the total number of data users is unbounded and user revocation can be carried out conveniently, supports data provider anonymity and traceability such that a data provider’s identity is not disclosed to data users in normal circumstances but can be traced by a trusted authority if necessary, and equally important, provides secure data provenance by presenting irrefutable evidence on who has created and modified the data in the cloud. However, most of the existing cloud storage systems with secure provenance either lack the expressiveness in access control or incur too much performance overhead or do not support dynamic user management. In this paper, we solve these problems by presenting an attribute-based cloud storage system with secure provenance. We first give a simple construction without achieving user revocation, and then extend it with an efficient revocation mechanism to prevent revoked data users from accessing the newly encrypted data. Thereafter, we implement the algorithms in the proposed two constructions to evaluate their performance. Our experimental results show that the proposed systems are acceptable to be applied in practice. |
format |
text |
author |
CUI, Hui DENG, Robert H. LI, Yingjiu |
author_facet |
CUI, Hui DENG, Robert H. LI, Yingjiu |
author_sort |
CUI, Hui |
title |
Attribute-based cloud storage with secure provenance over encrypted data |
title_short |
Attribute-based cloud storage with secure provenance over encrypted data |
title_full |
Attribute-based cloud storage with secure provenance over encrypted data |
title_fullStr |
Attribute-based cloud storage with secure provenance over encrypted data |
title_full_unstemmed |
Attribute-based cloud storage with secure provenance over encrypted data |
title_sort |
attribute-based cloud storage with secure provenance over encrypted data |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2018 |
url |
https://ink.library.smu.edu.sg/sis_research/3899 https://ink.library.smu.edu.sg/context/sis_research/article/4901/viewcontent/1_s20_S0167739X17322835_main.pdf |
_version_ |
1770573899458674688 |