TY - GEN
T1 - Secure fine-grained access control of mobile user data through untrusted cloud
AU - Zhou, Kai
AU - Ren, Jian
N1 - Publisher Copyright:
© 2016 IEEE.
Copyright:
Copyright 2017 Elsevier B.V., All rights reserved.
PY - 2016/9/14
Y1 - 2016/9/14
N2 - Cloud computing enables data owners to outsource their computationally intensive tasks and store private data to the shared cloud. To enhance the security while preserving the flexibility of data sharing, Attribute Based Encryption (ABE) was introduced to provide a fine-grained access control. A key issue in ABE based systems is the high computational overhead, which could be prohibitive for resource constrained mobile devices. In this paper, we propose a scheme to securely and efficiently outsource the computationally intensive access control operations of ABE to the shared cloud, thus reliving the computational burden of mobile users which can greatly improve the battery lifetime. In a high level view, data owners only need to specify access policies on the encrypted data so that access control can be done automatically by the cloud. Our proposed scheme guarantees that it is computationally infeasible for the untrusted cloud to recover the encrypted file and that the cloud is enforced to complete the full functionality of access control, even in situations where the cloud may be compromised by malicious data users. Our theoretical analysis and experiment results both demonstrate that our scheme can achieve high performance gain for resource constrained mobile devices.
AB - Cloud computing enables data owners to outsource their computationally intensive tasks and store private data to the shared cloud. To enhance the security while preserving the flexibility of data sharing, Attribute Based Encryption (ABE) was introduced to provide a fine-grained access control. A key issue in ABE based systems is the high computational overhead, which could be prohibitive for resource constrained mobile devices. In this paper, we propose a scheme to securely and efficiently outsource the computationally intensive access control operations of ABE to the shared cloud, thus reliving the computational burden of mobile users which can greatly improve the battery lifetime. In a high level view, data owners only need to specify access policies on the encrypted data so that access control can be done automatically by the cloud. Our proposed scheme guarantees that it is computationally infeasible for the untrusted cloud to recover the encrypted file and that the cloud is enforced to complete the full functionality of access control, even in situations where the cloud may be compromised by malicious data users. Our theoretical analysis and experiment results both demonstrate that our scheme can achieve high performance gain for resource constrained mobile devices.
KW - Attribute based encryption
KW - Fine-grained access control
KW - Mobile cloud computing
KW - Outsourcing
UR - http://www.scopus.com/inward/record.url?scp=84991806422&partnerID=8YFLogxK
U2 - 10.1109/ICCCN.2016.7568571
DO - 10.1109/ICCCN.2016.7568571
M3 - Conference article published in proceeding or book
AN - SCOPUS:84991806422
T3 - 2016 25th International Conference on Computer Communications and Networks, ICCCN 2016
BT - 2016 25th International Conference on Computer Communications and Networks, ICCCN 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 25th International Conference on Computer Communications and Networks, ICCCN 2016
Y2 - 1 August 2016 through 4 August 2016
ER -