Browse > Article
http://dx.doi.org/10.3837/tiis.2019.05.028

PreBAC: a novel Access Control scheme based Proxy Re-Encryption for cloud computing  

Su, Mang (School of Computer Science and Engineering Nanjing University of Science and Technology)
Wang, Liangchen (Nanjing Municipal Public Security Bureau)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.5, 2019 , pp. 2754-2767 More about this Journal
Abstract
Cloud computing is widely used in information spreading and processing, which has provided a easy and quick way for users to access data and retrieve service. Generally, in order to prevent the leakage of the information, the data in cloud is transferred in the encrypted form. As one of the traditional security technologies, access control is an important part for cloud security. However, the current access control schemes are not suitable for cloud, thus, it is a vital problem to design an access control scheme which should take account of complex factors to satisfy the various requirements for cipher text protection. We present a novel access control scheme based on proxy re-encryption(PRE) technology (PreBAC) for cipher text. It will suitable for the protection of data confidently and information privacy. At first, We will give the motivations and related works, and then specify system model for our scheme. Secondly, the algorithms are given and security of our scheme is proved. Finally, the comparisons between other schemes are made to show the advantages of PreBAC.
Keywords
multi-factor access control; proxy re-encryption(PRE); cipher text protection; cloud computing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Li, A. Squicciarini, D. Lin, et al, "SecLoc: Securing Location-Sensitive Storage in the Cloud," in Proc. of SACMAT'15, pp.51-61, June. 2015.
2 L. Zhou, V. Varadharajan, M. Hitchens, "Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage," IEEE Transactions on Information Forensics and Security, vol.10, no.11, pp. 2381-2395, Nov. 2015.   DOI
3 L. Zhou, V. Varadharajan, K. Gopinath, "A Secure Role-Based Cloud Storage System for Encrypted Patient-Centric Health Records," The Computer Journal, vol.59, no.11, pp. 1593-1611, July. 2016.   DOI
4 P. Xu, T Jiao, Q. Wu, et al, "Conditional Identity-Based Broadcast Proxy Re-Encryption And Its Application to Cloud Email," IEEE Transactions on Computers, vol.65, no.1, pp.66-79, Mar. 2015.   DOI
5 Y. Zhang, J. Li, X. Chen, et al, "Anonymous Attribute Based Proxy Re-Encryption for Access Control in Cloud Computing," Security and Communication Networks, vol. 9, no.14, pp.2397-2411, July. 2016.   DOI
6 J. Li, X. Zhao and Y. Zhang et al, "Provably Secure Certificate-based Conditional Proxy Re-encryption," Journal of Information Science & Engineering, vol.32, no.4, pp. 813-830, July. 2016.
7 Q. Liu, G. Wang, J. Wu, "Time-Based Proxy Re-Encryption Scheme for Secure Data Sharing in a Cloud Environment," Information Sciences, vol. 258, no.3, pp.355-370, Feb. 2014.   DOI
8 Y. Yang, H. Lu and J. Weng et al, "Fine-Grained Conditional Proxy Re-Encryption and Application," in Proc. of ProvSec 2014, pp. 206-222, Oct.2014.
9 Q. Tang, "Type-Based Proxy Re-encryption and Its Construction," Proc. INDOCRYPT 2008. Springer Berlin Heidelberg. pp. 130-144. 2008.
10 M. Su, G. Z. Shi Z, R. N. Xie, et al, "Multi-element based on proxy re-encryption scheme for mobile cloud computing," Journal of Communications, 36(11):73-79, 2015.   DOI
11 J. Luo, H. Wang and X. Gong, et al. "A Novel Role-Based Access Control Model in Cloud Environments," International Journal of Computational Intelligence Systems, vol.9, no.1, pp. 1-9, Feb. 2016.   DOI
12 M. Su, F. H. Li, G. Z. Shi, et al, "A User-Centric Data Secure Creation Scheme in Cloud Computing," Chinese Journal of Electronics, vol.25, no.4, pp. 753-760, April, 2016.   DOI
13 X. Jia, J. Shao, J. Jing, et al. "CCA-secure type-based proxy re-encryption with invisible proxy," in Proc. of Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, 1299-1305, 2010.
14 Y. D. Wang, J. H. Yang, C. Xu, et al, "Survey on Access Control Technologies for Cloud Computing," Ruan Jian Xue Bao/ Journal of Software, vol.26, no. 5, pp. 1129-1150, May, 2015.
15 S. Jha, S. Sural and J. Vaidya et al, "Security Analysis of Temporal RBAC under an Administrative Model," Computers & Security, vol. 46, pp.154-172, Oct. 2014.   DOI
16 L. Yang, Z. Tang, R. F. Li, et al, "Roles query algorithm in cloud computing environment based on user require," Journal of Communications, vol.32, no.7, pp 169-175, July, 2010.