Comparison-based encryption for fine-grained access control in clouds

Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, Hongjia Zhao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Scopus citations

Abstract

Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regulating data access in clouds. In this paper, we present an innovative comparison-based encryption scheme to facilitate fine-grained access control in cloud computing. By means of forward/backward derivation functions, we introduce comparison relation into attribute-based encryption to implement various range constraints on integer attributes, such as temporal and level attributes. Then, we present a new cryptosystem with dual decryption to reduce computational overheads on cloud clients, where the majority of decryption operations are executed in cloud servers. We also prove the security strength of our proposed scheme, and our experiment results demonstrate the efficiency of our methodology.

Original languageEnglish (US)
Title of host publicationCODASPY'12 - Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy
Pages105-116
Number of pages12
DOIs
StatePublished - 2012
Event2nd ACM Conference on Data and Application Security and Privacy, CODASPY'12 - San Antonio, TX, United States
Duration: Feb 7 2012Feb 9 2012

Publication series

NameCODASPY'12 - Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy

Conference

Conference2nd ACM Conference on Data and Application Security and Privacy, CODASPY'12
Country/TerritoryUnited States
CitySan Antonio, TX
Period2/7/122/9/12

Keywords

  • access control
  • attribute-based encryption
  • cloud
  • cryptography
  • dual decryption
  • integer comparison

ASJC Scopus subject areas

  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Comparison-based encryption for fine-grained access control in clouds'. Together they form a unique fingerprint.

Cite this