Title: Research on key techniques of cryptographic access control and properties optimisation in cloud storage

Authors: Shidong Zhu; Liu Jiang; Zhenliu Zhou

Addresses: College of Information, Shenyang Institute of Engineering, Shenyang 110136, China ' College of Information, Shenyang Institute of Engineering, Shenyang 110136, China ' College of Information, Shenyang Institute of Engineering, Shenyang 110136, China

Abstract: With the analysis of data privacy protection requirement from the users, we proposed cryptographic access control scheme and key distribution scheme based on ciphertext-policy attribute-based encryption (CP-ABE), and gave a hierarchy based on CP-ABE key generation algorithm. This scheme uses precise identity and hierarchal structure as the user attributes, and supports hierarchal key generation. As the cloud data are encrypted by the users, the data privacy protection can be effectively achieved in cloud storage against network attackers even if cloud service provider (CSP), suitable for the multi-user who has hierarchal structure attributes sharing cloud storage services environment. We also proposed two schemes for improving the usability of cloud storage system. The first one is that the metadata information of unstructured data are stored in cloud using non-relational database MongoDB, which can greatly improve the speed of data access. The second is data migration algorithm based on physical volume, which can migrate data to the matching devices automatically depending on user access frequency value. Experimental results showed that these programs were able to improve the storage efficiency of cloud storage system. The study is of theoretical significance and practical value to the similar systems.

Keywords: cloud storage; storage virtualisation; unstructured data storage; cryptographic access control; key generation; data privacy protection; ciphertext-policy attribute-based encryption; CP-ABE; data migration.

DOI: 10.1504/IJITM.2018.095043

International Journal of Information Technology and Management, 2018 Vol.17 No.4, pp.257 - 274

Available online: 01 Jun 2018 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article