data encryption. Users with write permission can
retrieve the policy but they cannot learn the policy
content.
7 CONCLUSION AND FUTURE
WORK
We have presented a privacy-preserving access
control model in collaborative cloud data storage
systems. We introduce the policy hiding scheme as an
integrative solution for enhancing the capability of
our access control scheme C-CP-ARBE. The
proposed hash-based policy enforcement
compliments limitation of the traditional CP-ABE in
terms of policy privacy. Significantly, our scheme
does not require the process of de-anonymization of
policy and the encryption is done as the same as plain
policy encryption. Finally, we analyze the access
control features of related works and present the
comparative analysis of our method and two related
works.
For future works, we will conduct a larger scale
of experiments and evaluate the performance of the
proposed system in the real cloud environment such
as CloudStack. We will also investigate the cloud
forensics and auditing techniques to guarantee the
accountability of user access and integrity of the data
and policy outsourced.
REFERENCES
Bethencourt, J., Sahai, A., and Waters B., 2007.
Ciphertext-policy Attribute-based Encryption, In IEEE
Symposium of Security and privacy, SP’07, IEEE,
pages 321.-334.
Chase, M., 2007. Multi-authority attribute based
encryption, In Proceedings of the 4th Theory of
Cryptography Conference on Theory of Cryptography
(TCC’07), Springer, pages 525-534.
Nishide, T., Yoneyama, K., and Ohta, K., 2008. Attribute-
based encryption with partially hidden encryptor-
specified access structures. In Proceedings of Applied
Cryptography and Network Security, ACNS’08.
LCNS, Vol.5037, pages 111-129. Springer.
Katz, J., Sahai, A., and Waters, B., 2008. Predicate
encryption supporting disjunctions, polynomial
equations, and inner products. In Proceedings of
International Conference on the Theory and
Applications of Cryptographic Techniques, Eurocrypt
2008. LNCS, Vol 4965. pages 146-162, Springer.
Yu, S., Ren, K., and Lou., W., 2008. Attribute-based
content distribution with hidden policy. In Proceedings
of 4
th
Workshop on Secure Network Protocols, NPSEC
2008. IEEE.
Chase, M. and Chow, M. 2009. Improving privacy and
security in multi-authority attribute-based encryption,
In Proceedings of the 16th ACM Conference on
Computer and Communications Security, CCS’09,
pages 121-130, ACM.
NIST. "A Statistical Test Suite for Random and
Pseudorandom Number Generators for Cryptographic
Applications". NIST, Special Publication April 2010.
Wang, G., Liu, Q., and Wu, J., 2010. Hierarchical attribute-
based encryption for fine-grained access control in
cloud storage services. In Proceedings of the 17th
ACM Conference on Computer and Communications
Security,CCS '10, pages 735-737, ACM.
Zhao, F., Nishide, T., and Sakurai, K., 2011. Realizing
Fine-Grained and Flexible Access Control to
Outsourced Data with Attribute-Based Cryptosystems,
In Proceedings of 7th International Conference of
Information Security Practice and Experience,
ISPEC’11, papges 83-97, Springer.
Lai, J., Deng, R. H., and Li, Y., 2011. Fully Secure
Cipertext-Policy Hiding CP-ABE, In Proceedings of
the 7th International Conference on Information
Security Practice and Experience, ISPEC’11, pages 24-
39, Springer.
Wan, Z., Liu, J., and Deng, R. H., 2012. HASBE: A
Hierarchical Attribute-Based Solution for Flexible and
Scalable Access Control in Cloud Computing. In IEEE
Transactions on Information Forensics and Security
7(2): pages 743-754, IEEE.
Li, M., Yu, S., Zheng, Y., Ren, K, and Lou, W., 2012.
Scalable and Secure Sharing of Personal Health
Records in Cloud Computing using Attribute-based
Encryption, In IEEE Transactions on Parallel and
Distributed Systems. Volume 24, Issue: 1, pages 131-
143, IEEE.
Ruj, S., Stojmenovic, M., and Nayak, A., 2012. Privacy
Preserving Access Control with Authentication for
Securing Data in Clouds, In Proceedings of 12th
IEEE/ACM International Symposium on Cluster,
Cloud and Grid Computing, CCGrid 2012, pages 556-
563, IEEE.
Asghar, M. R., Ion, M., Russello, G., and Crispo, B., 2013.
ESPOONERBAC: Enforcing Security Policies in
Outsourced Environments, In Elsevier Jounral of
Computers & Security (COSE), Volume 35, pages 2-
24. Elsevier Advanced Technology Publications.
Yang, K., Jia, X., Ren, K., Zhang, B., Xie, R., 2014.
Expressive, Efficient, and Revocable Data Access
Control for Multi-Authority Cloud Storage. IEEE
Transastions on Parallel Distributed Systems, Vol.
25(7), pages 1735-1744, IEEE.
Fugkeaw, S. and H. Sato, 2015. An extended CP-ABE
based Access control model for data outsourced in the
cloud, In Proceedings of IEEE International Workshop
on Middleware for Cyber Security, Cloud Computing
and Internetworking, MidCCI 2015, IEEE.
Java™ Platform, Standard Edition 7
API Specification, 2016. : Secure random number
generator Java library, https://docs.oracle.com/javase/
7/docs/api/java/security/ SecureRandom.html
CLOSER 2017 - 7th International Conference on Cloud Computing and Services Science
536