TY - GEN
T1 - Comparison-based encryption for fine-grained access control in clouds
AU - Zhu, Yan
AU - Hu, Hongxin
AU - Ahn, Gail-Joon
AU - Yu, Mengyang
AU - Zhao, Hongjia
PY - 2012
Y1 - 2012
N2 - Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regulating data access in clouds. In this paper, we present an innovative comparison-based encryption scheme to facilitate fine-grained access control in cloud computing. By means of forward/backward derivation functions, we introduce comparison relation into attribute-based encryption to implement various range constraints on integer attributes, such as temporal and level attributes. Then, we present a new cryptosystem with dual decryption to reduce computational overheads on cloud clients, where the majority of decryption operations are executed in cloud servers. We also prove the security strength of our proposed scheme, and our experiment results demonstrate the efficiency of our methodology.
AB - Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regulating data access in clouds. In this paper, we present an innovative comparison-based encryption scheme to facilitate fine-grained access control in cloud computing. By means of forward/backward derivation functions, we introduce comparison relation into attribute-based encryption to implement various range constraints on integer attributes, such as temporal and level attributes. Then, we present a new cryptosystem with dual decryption to reduce computational overheads on cloud clients, where the majority of decryption operations are executed in cloud servers. We also prove the security strength of our proposed scheme, and our experiment results demonstrate the efficiency of our methodology.
KW - access control
KW - attribute-based encryption
KW - cloud
KW - cryptography
KW - dual decryption
KW - integer comparison
UR - http://www.scopus.com/inward/record.url?scp=84863269353&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84863269353&partnerID=8YFLogxK
U2 - 10.1145/2133601.2133614
DO - 10.1145/2133601.2133614
M3 - Conference contribution
AN - SCOPUS:84863269353
SN - 9781450310918
T3 - CODASPY'12 - Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy
SP - 105
EP - 116
BT - CODASPY'12 - Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy
T2 - 2nd ACM Conference on Data and Application Security and Privacy, CODASPY'12
Y2 - 7 February 2012 through 9 February 2012
ER -