Abstract
Cloud storage, a new service system, springs up after the development of cloud computing. Along with the birth of cloud computing, massive data storage needs specialized cloud storage service provider to provide. Ciphertext traditional access control is achieved by controlling the ciphertext key management and distribution of keys for each file to be distributed to each user. However, in case of changing a file’s access permissions, the calculation of data for the Lord’s re-encryption computation is considerably large. Therefore, on the basis of attribute-based encryption and appropriate design of encrypted calculation, part of the calculation of re-encrypted data moves to the Cloud storage provider side without disclosing additional information design of appropriate encryption algorithm, so that the effective processing by the cloud could significantly improve the access time and improve the computational efficiency. The effectiveness of the plan has been verified through model experiment described at the end of the paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cheng, H., Zhang, M., Feng, D.: Achieving efficient dynamic cryptographic access control in cloud storage. J. China Inst. Commun. 32(7), 125–132 (2011)
Goyal, V., Pandey, O., Sahai, A.: Attribute-based encryption for fine-grained access control of encrypted data. In: 13th ACM, pp. 89–98 (2010)
Bethencount, J., Sahai, A., Water, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP’07, pp. 321–334 (2007)
Hong, C., Zhang, M., Feng, D.G.: AB-ACCS: a cryptographic access control scheme for cloud storage. J. Comput. Res. Dev. 47, 259–265 (2010)
Lv, Z.Q., Zhang, M., Feng, D.: Cloud storage access control scheme ciphertext of computer science and exploration. Jisuanji Kexue yu Tansuo 5(9), 835–844 (2011)
Sun, G.Z., Dong, Y., Li, Y.: CP-ABE based data access control for cloud storage. J. China Inst. Commun. 32(7), 146–152 (2011)
Liu, F., Yang, M.: Ciphertext policy attribute based encryption scheme for cloud storage. Jisuanji Yingyong Yanjiu 29(4), 1452–1456 (2012)
Yu, S., Wang, C., Ren, K.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9 (2010)
Li, M., Yu, S., Ren, K., Lou, W.: Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 89–106. Springer, Heidelberg (2010)
Acknowledgement
This research was supported by the National Natural Science Foundation of China (No. 61072039) and Special Fund for the Development of the Internet of things of the Ministry of Industry and Information Technology: Integrated Information Service Platform for Internet of Things of Hebei Logistics.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Song, N., Mei, Z., Yao, L. (2014). Research on Efficient Dynamic Cloud Storage Ciphertext Access Control. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_38
Download citation
DOI: https://doi.org/10.1007/978-3-662-43908-1_38
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43907-4
Online ISBN: 978-3-662-43908-1
eBook Packages: Computer ScienceComputer Science (R0)