mains, with the users now in a flat structure, or a pool
of users. The access control model allows for delega-
tion of access control management through clear role
definitions.
The current life-cycle management of the PRE key
pair hierarchy is based on the relationship between
key pairs in the form of PRE tokens. To allow a user
in a lower tier of the hierarchy to decrypt data, the
encrypted data must first go through a chain of re-
encryptions to pass down through the hierarchy end-
ing at the user. As the collaboration environment
evolves over time, the PRE key pair hierarchy poten-
tially becomes very deep. This is undesirable as the
additional re-encryptions result in an additional com-
putational overhead and expose structural information
about the hierarchy in the form of re-encryption du-
ration. This information could be used for timing
attacks which could potentially reveal cryptographic
details on how data is protected (Kocher, 1996). This
is a subject for future work.
REFERENCES
Ateniese, G., Fu, K., Green, M., and Hohenberger, S.
(2006). Improved proxy re-encryption schemes with
applications to secure distributed storage. ACM Trans.
Inf. Syst. Secur., 9:1–30.
Bellare, M., Boldyreva, A., and O’Neill, A. (2007). Deter-
ministic and efficiently searchable encryption. In Pro-
ceedings of the 27th Annual International Cryptology
Conference on Advances in Cryptology, CRYPTO’07,
pages 535–552, Berlin, Heidelberg. Springer-Verlag.
Blaze, M., Bleumer, G., and Strauss, M. (1998). Divert-
ible protocols and atomic proxy cryptography. In Ny-
berg, K., editor, Advances in Cryptology - EURO-
CRYPT’98, volume 1403 of Lecture Notes in Com-
puter Science, pages 127–144. Springer Berlin / Hei-
delberg.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., and Per-
siano, G. (2004). Public key encryption with keyword
search. In Cachin, C. and Camenisch, J., editors, Ad-
vances in Cryptology - EUROCRYPT 2004, volume
3027 of Lecture Notes in Computer Science, pages
506–522. Springer Berlin / Heidelberg.
Dong, C., Russello, G., and Dulay, N. (2008). Shared
and searchable encrypted data for untrusted servers.
In Atluri, V., editor, Data and Applications Security
XXII, volume 5094 of Lecture Notes in Computer Sci-
ence, pages 127–143. Springer Berlin / Heidelberg.
Dong, C., Russello, G., and Dulay, N. (2011). Shared and
searchable encrypted data for untrusted servers. J.
Comput. Secur., 19:367–397.
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., and
Chandramouli, R. (2001). Proposed nist standard for
role-based access control. ACM Trans. Inf. Syst. Se-
cur., 4(3):224–274.
Kamara, S. and Lauter, K. (2010). Cryptographic cloud
storage. Financial Cryptography and Data Security,
pages 136–149.
Kamara, S., Papamanthou, C., and Roeder, T. (2011).
CS2: A semantic cryptographic cloud storage sys-
tem. Technical report, Technical Report MSR-TR-
2011-58, Microsoft Research, 2011. http://research.
microsoft. com/apps/pubs. Accessed Apr 19 2012.
Kocher, P. (1996). Timing attacks on implementations
of Diffie-Hellman, RSA, DSS, and other systems.
In Koblitz, N., editor, Advances in Cryptology –
CRYPTO ’96, volume 1109 of Lecture Notes in Com-
puter Science, pages 104–113. Springer Berlin / Hei-
delberg.
Mather, T., Kumaraswamy, S., and Latif, S. (2009). Cloud
security and privacy: an enterprise perspective on
risks and compliance. O’Reilly Media, Inc.
Piechotta, C., Jensen, A. E., and Olsen, M. G. (2012).
Secure dynamic cloud-based collaboration with hier-
archical access. Master’s thesis, Aarhus University.
Published as technical report ECE-TR-8.
Ruj, S., Nayak, A., and Stojmenovic, I. (2011). DACC:
Distributed access control in clouds. In Trust, Secu-
rity and Privacy in Computing and Communications
(TrustCom), 2011 IEEE 10th International Confer-
ence on, pages 91 –98.
Schaffer, H. (2009). X as a service, cloud computing, and
the need for good judgment. IT Professional, 11(5):4–
5.
Simmons, G. J. (1979). Symmetric and asymmetric encryp-
tion. ACM Comput. Surv., 11(4):305–330.
Yu, S., Wang, C., Ren, K., and Lou, W. (2010). Achieving
secure, scalable, and fine-grained data access control
in cloud computing. In INFOCOM, 2010 Proceedings
IEEE, pages 1–9. IEEE.
Zhao, F., Nishide, T., and Sakurai, K. (2011). Realizing
fine-grained and flexible access control to outsourced
data with attribute-based cryptosystems. In Bao, F.
and Weng, J., editors, Information Security Practice
and Experience, volume 6672 of Lecture Notes in
Computer Science, pages 83–97. Springer Berlin /
Heidelberg.
Zhou, M., Zhang, R., Xie, W., Qian, W., and Zhou, A.
(2010). Security and privacy in cloud computing: A
survey. In Semantics Knowledge and Grid (SKG),
2010 Sixth International Conference on, pages 105–
112.
ASecureDynamicCollaborationEnvironmentinaCloudContext
415