Int. J. of Cloud Computing   »   2016 Vol.5, No.3

 

 

Title: Reinforce cloud computing access control with key policy attribute-based anonymous proxy reencryption

 

Authors: Naîma Meddah; Ahmed Toumanari

 

Addresses:
Laboratory of Systems Engineering and Information Technology (LSEIT), National School of Applied Science, ENSA, Agadir, Morocco
Laboratory of Systems Engineering and Information Technology (LSEIT), National School of Applied Science, ENSA, Agadir, Morocco

 

Abstract: Cloud computing is an emerging paradigm that provide technology and computer resources as a service. However due to data outsourcing and untrusted cloud servers, the data privacy and data access control becomes a challenging issues in cloud computing. In this paper, we propose a fine-grained access control system using a combination of key-policy attribute-based encryption system and an anonymous proxy reencryption, this proposed scheme is an efficient model that enforcing access policies based on data attributes, allowing the delegation of computation implicated in fine-grained access control to untrusted cloud servers without disclosing the data content. Previous schemes that use (KP-ABE) and proxy reencryption, leave how to be secure against chosen-cipher-text attacks (CCAs) as an open problem. The new scheme supports attribute-based encryption with anonymous proxy re-encryption. Our scheme is CCA secure, and secret key security is guaranteed, which is not provided by the current work.

 

Keywords: cloud computing; access control; data privacy; chosen cipher text attacks; CCAs; key policy ABE; attribute-based encryption; KP-ABE; proxy reencryption; PRE; anonymous proxy; cloud security; cryptography; secret key security; privacy protection; privacy protection.

 

DOI: 10.1504/IJCC.2016.10000905

 

Int. J. of Cloud Computing, 2016 Vol.5, No.3, pp.187 - 197

 

Available online: 27 Oct 2016

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article