DocumentCode :
1351037
Title :
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
Author :
Wan, Zhiguo ; Liu, Jun E. ; Deng, Robert H.
Author_Institution :
Key Lab. for Inf. Syst. Security, Tsinghua Univ., Beijing, China
Volume :
7
Issue :
2
fYear :
2012
fDate :
4/1/2012 12:00:00 AM
Firstpage :
743
Lastpage :
754
Abstract :
Cloud computing has emerged as one of the most influential paradigms in the IT industry in recent years. Since this new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. Several schemes employing attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing; however, most of them suffer from inflexibility in implementing complex access control policies. In order to realize scalable, flexible, and fine-grained access control of outsourced data in cloud computing, in this paper, we propose hierarchical attribute-set-based encryption (HASBE) by extending ciphertext-policy attribute-set-based encryption (ASBE) with a hierarchical structure of users. The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility and fine-grained access control in supporting compound attributes of ASBE. In addition, HASBE employs multiple value assignments for access expiration time to deal with user revocation more efficiently than existing schemes. We formally prove the security of HASBE based on security of the ciphertext-policy attribute-based encryption (CP-ABE) scheme by Bethencourt and analyze its performance and computational complexity. We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments.
Keywords :
authorisation; cloud computing; computational complexity; cryptography; data privacy; outsourcing; IT industry; access expiration time; ciphertext policy attribute set based encryption; cloud computing; computational complexity; fine grained access control; hierarchical attribute set based encryption; multiple value assignments; outsourced data; privacy concerns; security concerns; user revocation; Access control; Cloud computing; Educational institutions; Encryption; Scalability; Access control; cloud computing; data security;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2011.2172209
Filename :
6046132
Link To Document :
بازگشت