For the sake of practicability of cloud computing, fine-grained data access is frequently required in the sense that users with different attributes should be granted different levels of access privileges. However, most of existing access control solutions are not suitable for resource-constrained users because of large computation costs, which linearly increase with the complexity of access policies. In this paper, we present an access control system based on ciphertext-policy attribute-based encryption. The proposed access control system enjoys constant computation cost and is proven secure in the random oracle model under the decision Bilinear Diffie-Hellman Exponent assumption. Our access control system supports AND-gate access policies with multiple values and wildcards, and it can efficiently support direct user revocation. Performance comparisons indicate that the proposed solution is suitable for resource-constrained environment.
Publié le : 2018-07-03
Classification:  Other areas of Computing and Informatics,  Attribute-based encryption, constant computation, access control, revocation, cloud computing,  94A60
@article{cai2018_2_327,
     author = {Yinghui Zhang; National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications Xi'an 710121 \& State Key Laboratory of Cryptology, Beijing 100878 and Dong Zheng; National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications Xi'an 710121 \& State Key Laboratory of Cryptology, Beijing 100878 and Rui Guo; National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications Xi'an 710121 and Qinglan Zhao; National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications Xi'an 710121},
     title = {Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing},
     journal = {Computing and Informatics},
     volume = {36},
     number = {6},
     year = {2018},
     language = {en},
     url = {http://dml.mathdoc.fr/item/cai2018_2_327}
}
Yinghui Zhang; National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications Xi'an 710121 & State Key Laboratory of Cryptology, Beijing 100878; Dong Zheng; National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications Xi'an 710121 & State Key Laboratory of Cryptology, Beijing 100878; Rui Guo; National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications Xi'an 710121; Qinglan Zhao; National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications Xi'an 710121. Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing. Computing and Informatics, Tome 36 (2018) no. 6, . http://gdmltest.u-ga.fr/item/cai2018_2_327/