Abstract
Cloud computing service provider cannot be totally trusted due to data security reasons, risk of data security and violation of privacy factors should be considered. Especially, guaranteeing data confidentiality is required. To solve these problems, S.C. Yu etc. proposed scheme which guarantees data confidentiality and fine-grained access control. However, data confidentiality can be violated by collusion attack of revoked user and cloud server. To solve this problem, we guaranteed data confidentiality by storing and dividing data file into header and body. In addition, the method of selective delegation regarding the whole or partial message according to delegator’s reliability towards delegate using type-based re-encryption was specified.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
CSA : Security Guidance for Critical Areas of Focus Cloud Computing, vol. 2.1 (2009)
Benaloh, J., Chase, M., Horvitz, E., Lauter, K.: Patient controlled encryption: ensuring privacy of electronic medical records. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 103–114. Association for Computing Machinery, New York (2009)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-Policy Attribute-Based Encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
Ibraimi, L., Tang, Q., Hartel, P., Jonker, W.: A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. In: 5th VLDB Workshop on Secure Data Management, SDM, August 24, pp. 185–198 (2008)
Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998)
Yu, S.C., Wang, C., Ren, K.I., Lou, W.J.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: INFOCOM, 2010 Proceedings IEEE, pp. 321–334 (2010)
Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O’Reilly Media, Sebastopol (2009)
Park, N., Kwak, J., Kim, S., Won, D.H., Kim, H.W.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)
Park, N., Kim, H.W., Kim, S., Won, D.H.: Open location-based service using secure middleware infrastructure in web services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)
Park, N., Kim, H.W., Kim, S., Won, D.H.: Open location-based service using secure middleware infrastructure in web services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)
Park, N., Kim, S., Won, D.: Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. In: ASC, Advances in Soft Computing, vol. 43, pp. 151–156. Springer, Heidelberg (2007)
Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. Communications in Computer and Information Science, vol. 106, pp. 72–79. Springer, Heidelberg (2010)
Park, N., Kim, S., Won, D.H., Kim, H.W.: Security analysis and implementation leveraging globally networked rFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proc. of CCS 2006. Association for Computing Machinery, New York (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Park, N. (2011). Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, TF., Hong, CF., Nguyen, N.T. (eds) Semantic Methods for Knowledge Management and Communication. Studies in Computational Intelligence, vol 381. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23418-7_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-23418-7_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23417-0
Online ISBN: 978-3-642-23418-7
eBook Packages: EngineeringEngineering (R0)