A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow
With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1127308Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 638
 Wang Cong, Wang Qian, Ren Kui, et al. Privace-Preserving public Auditing for Data Storage Security in Cloud Computing(c)//Proceedings of the 29th IEEE Conference on Computer Communications.2010: pp. 1-9.
 Zhao Gan-sen, Rong Chun-ming, Jin Li, el. Trusted Data Sharing Over Untrusted Cloud Storage Provides (c)//Proceedings of the 2nd IEEE Conference on Cloud Computing Technology and Science. 2010: pp. 97-103.
 M. Sowmya Varshini, D. Palanikkumar, G. Rathi. An Improved Security Enabled Distribution of Protected Cloud Storage Services by Zero-Knowledge Proof based on RSA Assumption (c)// International Journal of Computer Applications, 2012, Volume 40, No. 5: pp.18-22
 Hui jun Xiong, Xin wen Zhang, Wei Zhu, Dan feng Yao.CloudSeal: End-to-End Content Protection in Cloud-based Storage and Delivery Services.7th International ICST Conference, Secure Comm. 2011: pp. 491-500.
 Zhang Xing, Wen Zilong, Shen Qingni, Fang Yuejian, Wu Zhenghua. Accountable Attribute-Based Encryption Scheme Without Key Escrow (c)// Journal Of Computer Research and Development：2015:2293-2303.
 Goyal V, Pandey O, Sshai A, et al, Attribute-based encryption for fine-grained access control of encrypted data (c)Proc of CCS 2006, New York: ACM, 2006; 89-98.
 Dae. men, V, Rij. men. AES proposal: Rij.ndael (Version 2) (EB). Available: NIST AES websitecsrc.nist.gov/ encryption/ aes.