Abstract

A new access control method based on multi-authority in cloud storage service

Highlights

  • With the arrival of the era of big data, data has become a kind of important assets

  • This paper proposes an access control method to revoke user rights based on cloud storage service

  • This paper proposes an access control method that can revoke user rights in the e-commerce cloud storage service

Read more

Summary

Introduction

With the arrival of the era of big data, data has become a kind of important assets. In order to get a better utilization of big data, paid or unpaid data sharing will be a trend. In the KP-ABE framework, ciphertext is associated with a set of descriptive attributes, and the access control structure is contained in the user key. In the CP-ABE framework, the ciphertext contains an access control structure, and the user key is associated with a set of descriptive attributes, which is similar to the traditional access control mechanism. Pervez et al.[11] proposes an autonomous access scheme that revokes user rights by reconstructing access structures The innovation of this method is that user privileges can be revoked only if a new attribute is added to the original access tree. In cloud storage access control, once there is revocation of user rights, the data owner encrypts the ciphertext again, regenerates the user's private key and distributes it to each user. This paper proposes an access control method to revoke user rights based on cloud storage service. There is no need to update the ciphertext components associated with all attributes, which can be efficiently revoked

Definition of access structure tree
Conspiracy attack
Data secrecy
Data separation
Experiment and result
Computational cost
Communication cost
Conclusions and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call