Achieving Lightweight and Fine-grained Access Control in Mobile Cloud Computing

Heng He, Chuan Tian, Yu Jin, Wei Xia, Yadan Wang

2015

Abstract

Mobile cloud computing has emerged as one of the most promising technologies, which can greatly enlarge the application range of mobile devices by moving data storage and processing to powerful and centralized computing platforms located in clouds. However, how to keep data security and data privacy is an important and challenging issue when users outsource their sensitive data to mobile cloud for sharing. In this paper, we present a novel lightweight and fine-grained data access control scheme based on attribute-based encryption for mobile cloud computing. The analysis shows that the proposed scheme can meet the security requirement of mobile cloud computing, and provide flexible and expressive data access control policy. Furthermore, it has less computation cost compared with other schemes.

References

  1. Mell, P., Grance, T., 2011. The NIST Definition of Cloud Computing, NIST Special Publication 800-145.
  2. Chen, D., Zhao, H., 2012. Data security and privacy protection issues in cloud computing. In Proceedings of the 1st International Conference on Computer Science and Electronics Engineering, pp. 647-651. IEEE Computer Society.
  3. Yu, S., Wang, C., Ren, K., Lou, W., 2010. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of the 29th International Conference on Computer Communications, pp. 1-9. IEEE Computer Society.
  4. Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K., 2003. Plutus: scalable secure file sharing on untrusted storage. In Proceedings of the 2nd Conference on File and Storage Technologies, pp. 29- 42.
  5. Di Vimercati, S. D. C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P., 2007. Over-encryption: management of access control evolution on outsourced data. In Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 123-134. VLDB endowment.
  6. Bethencourt, J., Sahai, A., Waters, B., 2007. Ciphertextpolicy attribute-based encryption. In Proceedings of the 28th IEEE Symposium on Security and Privacy, pp. 321-334. IEEE Computer Society.
  7. Hur, J., Noh, D. K., 2011. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems, 22(7), pp. 1214-1221. IEEE Computer Society.
  8. Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., Jonker, W., 2009. Mediated ciphertext-policy attribute-based encryption and its application. In Proceedings of the International Conference on Information Security Applications, pp. 309-323. Springer Berlin Heidelberg.
  9. Wang, G., Liu, Q., Wu, J., 2010. Hierarchical attributebased encryption for fine-grained access control in cloud storage services. In Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 735-737. ACM Press.
  10. Sahai, A., Waters, B., 2005. Fuzzy identity-based encryption. In Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457- 473. Springer Berlin Heidelberg.
  11. Shamir, A., 1979. How to share a secret. Communications of the ACM, 22(11), pp. 612-613. ACM Press.
  12. Ibraimi, L., Tang, Q., Hartel, P., Jonker, W., 2009. Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In Proceedings of the 5th International Conference on Information Security Practice and Experience, pp. 1-12. Springer Berlin Heidelberg.
Download


Paper Citation


in Harvard Style

He H., Tian C., Jin Y., Xia W. and Wang Y. (2015). Achieving Lightweight and Fine-grained Access Control in Mobile Cloud Computing . In Proceedings of the Information Science and Management Engineering III - Volume 1: ISME, ISBN 978-989-758-163-2, pages 510-515. DOI: 10.5220/0006029605100515


in Bibtex Style

@conference{isme15,
author={Heng He and Chuan Tian and Yu Jin and Wei Xia and Yadan Wang},
title={Achieving Lightweight and Fine-grained Access Control in Mobile Cloud Computing},
booktitle={Proceedings of the Information Science and Management Engineering III - Volume 1: ISME,},
year={2015},
pages={510-515},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006029605100515},
isbn={978-989-758-163-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Information Science and Management Engineering III - Volume 1: ISME,
TI - Achieving Lightweight and Fine-grained Access Control in Mobile Cloud Computing
SN - 978-989-758-163-2
AU - He H.
AU - Tian C.
AU - Jin Y.
AU - Xia W.
AU - Wang Y.
PY - 2015
SP - 510
EP - 515
DO - 10.5220/0006029605100515