Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing

Published: 01 April 2012 Publication History

Abstract

Cloud computing has emerged as one of the most influential paradigms in the IT industry in recent years. Since this new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. Several schemes employing attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing; however, most of them suffer from inflexibility in implementing complex access control policies. In order to realize scalable, flexible, and fine-grained access control of outsourced data in cloud computing, in this paper, we propose hierarchical attribute-set-based encryption (HASBE) by extending ciphertext-policy attribute-set-based encryption (ASBE) with a hierarchical structure of users. The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility and fine-grained access control in supporting compound attributes of ASBE. In addition, HASBE employs multiple value assignments for access expiration time to deal with user revocation more efficiently than existing schemes. We formally prove the security of HASBE based on security of the ciphertext-policy attribute-based encryption (CP-ABE) scheme by Bethencourt et. al. and analyze its performance and computational complexity. We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments.

Cited By

View all
  • (2024)An Efficient Verification Approach to Separation of Duty in Attribute-Based Access ControlIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.337356236:9(4428-4442)Online publication date: 1-Sep-2024
  • (2023)Implementation and Analysis on Efficient Proxy-based Multicast Secure Data Sharing Mechanism with CP-ABE Supporting Outsourcing Decryption in IoT EnvironmentProceedings of the 2023 11th International Conference on Information Technology: IoT and Smart City10.1145/3638985.3639008(134-141)Online publication date: 14-Dec-2023
  • (2023)Efficient Location-Based Skyline Queries With Secure R-Tree Over Encrypted DataIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.325388335:10(10436-10450)Online publication date: 8-Mar-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security  Volume 7, Issue 2
April 2012
493 pages

Publisher

IEEE Press

Publication History

Published: 01 April 2012

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)An Efficient Verification Approach to Separation of Duty in Attribute-Based Access ControlIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.337356236:9(4428-4442)Online publication date: 1-Sep-2024
  • (2023)Implementation and Analysis on Efficient Proxy-based Multicast Secure Data Sharing Mechanism with CP-ABE Supporting Outsourcing Decryption in IoT EnvironmentProceedings of the 2023 11th International Conference on Information Technology: IoT and Smart City10.1145/3638985.3639008(134-141)Online publication date: 14-Dec-2023
  • (2023)Efficient Location-Based Skyline Queries With Secure R-Tree Over Encrypted DataIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.325388335:10(10436-10450)Online publication date: 8-Mar-2023
  • (2023)Achieving Fine-Grained Data Sharing for Hierarchical Organizations in CloudsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.315346720:2(1364-1377)Online publication date: 1-Mar-2023
  • (2023)ERACMA: Expressive and Revocable Access Control With Multi-Authority for AIoT-Enabled Human Centric Consumer ElectronicsIEEE Transactions on Consumer Electronics10.1109/TCE.2023.330675270:1(1102-1111)Online publication date: 21-Aug-2023
  • (2023)Construction of system friendly attribute based fully distributed access control architecture for e-healthcareMultimedia Tools and Applications10.1007/s11042-023-14836-w82:17(26937-26953)Online publication date: 7-Mar-2023
  • (2023)Application of Data Encryption in Chinese Named Entity RecognitionArtificial Neural Networks and Machine Learning – ICANN 202310.1007/978-3-031-44198-1_9(99-111)Online publication date: 26-Sep-2023
  • (2022)A Scalable Trustworthy Infrastructure for Collaborative Container RepositoriesDistributed Ledger Technologies: Research and Practice10.1145/35547601:1(1-29)Online publication date: 9-Sep-2022
  • (2022)Auditable attribute-based data access control using blockchain in cloud storageThe Journal of Supercomputing10.1007/s11227-021-04293-378:8(10772-10798)Online publication date: 1-May-2022
  • (2022)A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare ScenariosInformation Security Practice and Experience10.1007/978-3-031-21280-2_35(624-639)Online publication date: 23-Nov-2022
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media