z-logo
open-access-imgOpen Access
Re‐definable access control over outsourced data in cloud storage systems
Author(s) -
Zhang Zhigang,
Chang Chaowen,
Guo Zhimin,
Han Peisheng
Publication year - 2019
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2018.5365
Subject(s) - encryption , access control , computer science , outsourcing , cloud computing , computer security , server , client side encryption , cryptography , cloud storage , attribute based encryption , data access , computer network , on the fly encryption , database , public key cryptography , operating system , business , marketing
There is an increasing concern for data privacy when people outsource their data to remote cloud storage servers. To secure outsourced data, cloud users are suggested to employ cryptographic encryption to specify access policies such that only users meeting the policies can access the data. After the application of an encryption, however, users are difficult to modify their access policies since the policies were already formulated by the encryption. To address such problem, the authors propose a new approach referred to as re‐definable access control (RDAC). The RDAC utilises identity‐based encryption (IBE) and attribute‐based encryption (ABE) to secure outsourced data and allows users to choose either to achieve access control according to their capability and requirements. Moreover, the RDAC allows users to change simple access policies into fine‐grained access policies by converting IBE encrypted files into ABE encrypted ones, without leaking the underlying data. Surprisingly, the access policy conversion does not require the users to perform any costly computation, nor the storage servers to be disturbed. The authors prove the security of RDAC under a rigorous definition, and empirically show that the introduction of the conversion incurs almost no costs to the outsourcing and access procedures.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here