Abstract

With the continuous development of cloud storage technology, cloud storage has become a new way of storage for both enterprises and individuals. The cloud environment can support users to share data, but it can lead to some malicious users accessing or modifying data by illegal means, so access control is an important way to protect user data. In this paper, we propose a traceable attribute encryption scheme based on signature authentication and based on the information efficient inverse model of an asymmetric random matrix, which can trace the user who leaks information. A user attribute revocation scheme based on improved attribute encryption is also proposed, which enables data owners to reduce computational overhead. In cloud storage access control, the workload of the data owner increases exponentially when facing a high number of user attribute revocation problems, which are jointly decided by the data owner and the authorization center. An error proportional allocation (EPA) calculation method is developed to achieve an optimal estimation of system parameters in the lattice cipher scheme; experimental results show that the scheme has the advantages of shorter parameters, efficient computation, and lower storage load, proving that the scheme is resistant to IND-SAS-CPA under the standard model-based assumption of determining LWE semantic security against IND-SAS-CPA attacks; and it is used in a cloud file sharing (CFS) service framework, which can make sensitive cloud data free from the risk of privacy leakage.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call