Title: Reinforce cloud computing access control with key policy attribute-based anonymous proxy reencryption

Authors: Naîma Meddah; Ahmed Toumanari

Addresses: Laboratory of Systems Engineering and Information Technology (LSEIT), National School of Applied Science, ENSA, Agadir, Morocco ' Laboratory of Systems Engineering and Information Technology (LSEIT), National School of Applied Science, ENSA, Agadir, Morocco

Abstract: Cloud computing is an emerging paradigm that provide technology and computer resources as a service. However due to data outsourcing and untrusted cloud servers, the data privacy and data access control becomes a challenging issues in cloud computing. In this paper, we propose a fine-grained access control system using a combination of key-policy attribute-based encryption system and an anonymous proxy reencryption, this proposed scheme is an efficient model that enforcing access policies based on data attributes, allowing the delegation of computation implicated in fine-grained access control to untrusted cloud servers without disclosing the data content. Previous schemes that use (KP-ABE) and proxy reencryption, leave how to be secure against chosen-cipher-text attacks (CCAs) as an open problem. The new scheme supports attribute-based encryption with anonymous proxy re-encryption. Our scheme is CCA secure, and secret key security is guaranteed, which is not provided by the current work.

Keywords: cloud computing; access control; data privacy; chosen cipher text attacks; CCAs; key policy ABE; attribute-based encryption; KP-ABE; proxy reencryption; PRE; anonymous proxy; cloud security; cryptography; secret key security; privacy protection; privacy protection.

DOI: 10.1504/IJCC.2016.080044

International Journal of Cloud Computing, 2016 Vol.5 No.3, pp.187 - 197

Available online: 27 Oct 2016

Full-text access for editors Access for subscribers Purchase this article Comment on this article