Attribute-based cloud storage with secure provenance over encrypted data

To securely and conveniently enjoy the benefits of cloud storage, it is desirable to design a cloud data storage system which protects data privacy from storage servers through encryption, allows fine-grained access control such that data providers can expressively specify who are eligible to access...

Full description

Saved in:
Bibliographic Details
Main Authors: CUI, Hui, DENG, Robert H., LI, Yingjiu
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2018
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/3899
https://ink.library.smu.edu.sg/context/sis_research/article/4901/viewcontent/1_s20_S0167739X17322835_main.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-4901
record_format dspace
spelling sg-smu-ink.sis_research-49012020-03-27T01:12:50Z Attribute-based cloud storage with secure provenance over encrypted data CUI, Hui DENG, Robert H. LI, Yingjiu To securely and conveniently enjoy the benefits of cloud storage, it is desirable to design a cloud data storage system which protects data privacy from storage servers through encryption, allows fine-grained access control such that data providers can expressively specify who are eligible to access the encrypted data, enables dynamic user management such that the total number of data users is unbounded and user revocation can be carried out conveniently, supports data provider anonymity and traceability such that a data provider’s identity is not disclosed to data users in normal circumstances but can be traced by a trusted authority if necessary, and equally important, provides secure data provenance by presenting irrefutable evidence on who has created and modified the data in the cloud. However, most of the existing cloud storage systems with secure provenance either lack the expressiveness in access control or incur too much performance overhead or do not support dynamic user management. In this paper, we solve these problems by presenting an attribute-based cloud storage system with secure provenance. We first give a simple construction without achieving user revocation, and then extend it with an efficient revocation mechanism to prevent revoked data users from accessing the newly encrypted data. Thereafter, we implement the algorithms in the proposed two constructions to evaluate their performance. Our experimental results show that the proposed systems are acceptable to be applied in practice. 2018-02-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3899 info:doi/10.1016/j.future.2017.10.010 https://ink.library.smu.edu.sg/context/sis_research/article/4901/viewcontent/1_s20_S0167739X17322835_main.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Cloud storage Secure provenance Access control Scalability Confidentiality Anonymity Traceability Revocation Databases and Information Systems Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Cloud storage
Secure provenance
Access control
Scalability
Confidentiality
Anonymity
Traceability
Revocation
Databases and Information Systems
Information Security
spellingShingle Cloud storage
Secure provenance
Access control
Scalability
Confidentiality
Anonymity
Traceability
Revocation
Databases and Information Systems
Information Security
CUI, Hui
DENG, Robert H.
LI, Yingjiu
Attribute-based cloud storage with secure provenance over encrypted data
description To securely and conveniently enjoy the benefits of cloud storage, it is desirable to design a cloud data storage system which protects data privacy from storage servers through encryption, allows fine-grained access control such that data providers can expressively specify who are eligible to access the encrypted data, enables dynamic user management such that the total number of data users is unbounded and user revocation can be carried out conveniently, supports data provider anonymity and traceability such that a data provider’s identity is not disclosed to data users in normal circumstances but can be traced by a trusted authority if necessary, and equally important, provides secure data provenance by presenting irrefutable evidence on who has created and modified the data in the cloud. However, most of the existing cloud storage systems with secure provenance either lack the expressiveness in access control or incur too much performance overhead or do not support dynamic user management. In this paper, we solve these problems by presenting an attribute-based cloud storage system with secure provenance. We first give a simple construction without achieving user revocation, and then extend it with an efficient revocation mechanism to prevent revoked data users from accessing the newly encrypted data. Thereafter, we implement the algorithms in the proposed two constructions to evaluate their performance. Our experimental results show that the proposed systems are acceptable to be applied in practice.
format text
author CUI, Hui
DENG, Robert H.
LI, Yingjiu
author_facet CUI, Hui
DENG, Robert H.
LI, Yingjiu
author_sort CUI, Hui
title Attribute-based cloud storage with secure provenance over encrypted data
title_short Attribute-based cloud storage with secure provenance over encrypted data
title_full Attribute-based cloud storage with secure provenance over encrypted data
title_fullStr Attribute-based cloud storage with secure provenance over encrypted data
title_full_unstemmed Attribute-based cloud storage with secure provenance over encrypted data
title_sort attribute-based cloud storage with secure provenance over encrypted data
publisher Institutional Knowledge at Singapore Management University
publishDate 2018
url https://ink.library.smu.edu.sg/sis_research/3899
https://ink.library.smu.edu.sg/context/sis_research/article/4901/viewcontent/1_s20_S0167739X17322835_main.pdf
_version_ 1770573899458674688