A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33104
A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: Cloud storage security, sharing storage, attributes, Hash algorithm.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1127308

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1037

References:


[1] Wang Cong, Wang Qian, Ren Kui, et al. Privace-Preserving public Auditing for Data Storage Security in Cloud Computing(c)//Proceedings of the 29th IEEE Conference on Computer Communications.2010: pp. 1-9.
[2] Zhao Gan-sen, Rong Chun-ming, Jin Li, el. Trusted Data Sharing Over Untrusted Cloud Storage Provides (c)//Proceedings of the 2nd IEEE Conference on Cloud Computing Technology and Science. 2010: pp. 97-103.
[3] M. Sowmya Varshini, D. Palanikkumar, G. Rathi. An Improved Security Enabled Distribution of Protected Cloud Storage Services by Zero-Knowledge Proof based on RSA Assumption (c)// International Journal of Computer Applications, 2012, Volume 40, No. 5: pp.18-22
[4] Hui jun Xiong, Xin wen Zhang, Wei Zhu, Dan feng Yao.CloudSeal: End-to-End Content Protection in Cloud-based Storage and Delivery Services.7th International ICST Conference, Secure Comm. 2011: pp. 491-500.
[5] Zhang Xing, Wen Zilong, Shen Qingni, Fang Yuejian, Wu Zhenghua. Accountable Attribute-Based Encryption Scheme Without Key Escrow (c)// Journal Of Computer Research and Development:2015:2293-2303.
[6] Goyal V, Pandey O, Sshai A, et al, Attribute-based encryption for fine-grained access control of encrypted data (c)Proc of CCS 2006, New York: ACM, 2006; 89-98.
[7] Dae. men, V, Rij. men. AES proposal: Rij.ndael (Version 2) (EB). Available: NIST AES websitecsrc.nist.gov/ encryption/ aes.