Skip to main content

Research on Efficient Dynamic Cloud Storage Ciphertext Access Control

  • Conference paper
  • First Online:
Book cover Trustworthy Computing and Services (ISCTCS 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 426))

Included in the following conference series:

  • 1180 Accesses

Abstract

Cloud storage, a new service system, springs up after the development of cloud computing. Along with the birth of cloud computing, massive data storage needs specialized cloud storage service provider to provide. Ciphertext traditional access control is achieved by controlling the ciphertext key management and distribution of keys for each file to be distributed to each user. However, in case of changing a file’s access permissions, the calculation of data for the Lord’s re-encryption computation is considerably large. Therefore, on the basis of attribute-based encryption and appropriate design of encrypted calculation, part of the calculation of re-encrypted data moves to the Cloud storage provider side without disclosing additional information design of appropriate encryption algorithm, so that the effective processing by the cloud could significantly improve the access time and improve the computational efficiency. The effectiveness of the plan has been verified through model experiment described at the end of the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cheng, H., Zhang, M., Feng, D.: Achieving efficient dynamic cryptographic access control in cloud storage. J. China Inst. Commun. 32(7), 125–132 (2011)

    Google Scholar 

  2. Goyal, V., Pandey, O., Sahai, A.: Attribute-based encryption for fine-grained access control of encrypted data. In: 13th ACM, pp. 89–98 (2010)

    Google Scholar 

  3. Bethencount, J., Sahai, A., Water, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP’07, pp. 321–334 (2007)

    Google Scholar 

  4. Hong, C., Zhang, M., Feng, D.G.: AB-ACCS: a cryptographic access control scheme for cloud storage. J. Comput. Res. Dev. 47, 259–265 (2010)

    Google Scholar 

  5. Lv, Z.Q., Zhang, M., Feng, D.: Cloud storage access control scheme ciphertext of computer science and exploration. Jisuanji Kexue yu Tansuo 5(9), 835–844 (2011)

    Google Scholar 

  6. Sun, G.Z., Dong, Y., Li, Y.: CP-ABE based data access control for cloud storage. J. China Inst. Commun. 32(7), 146–152 (2011)

    Google Scholar 

  7. Liu, F., Yang, M.: Ciphertext policy attribute based encryption scheme for cloud storage. Jisuanji Yingyong Yanjiu 29(4), 1452–1456 (2012)

    Google Scholar 

  8. Yu, S., Wang, C., Ren, K.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9 (2010)

    Google Scholar 

  9. Li, M., Yu, S., Ren, K., Lou, W.: Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 89–106. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

Download references

Acknowledgement

This research was supported by the National Natural Science Foundation of China (No. 61072039) and Special Fund for the Development of the Internet of things of the Ministry of Industry and Information Technology: Integrated Information Service Platform for Internet of Things of Hebei Logistics.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ningning Song .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Song, N., Mei, Z., Yao, L. (2014). Research on Efficient Dynamic Cloud Storage Ciphertext Access Control. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43908-1_38

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43907-4

  • Online ISBN: 978-3-662-43908-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics