WU Deming, ZHANG Yu, WANG Lina, et al., “EACS: An Efficient Access Control Scheme for Electronic Publishing in Cloud Computing,” Chinese Journal of Electronics, vol. 27, no. 1, pp. 60-69, 2018, doi: 10.1049/cje.2017.11.009
Citation: WU Deming, ZHANG Yu, WANG Lina, et al., “EACS: An Efficient Access Control Scheme for Electronic Publishing in Cloud Computing,” Chinese Journal of Electronics, vol. 27, no. 1, pp. 60-69, 2018, doi: 10.1049/cje.2017.11.009

EACS: An Efficient Access Control Scheme for Electronic Publishing in Cloud Computing

doi: 10.1049/cje.2017.11.009
Funds:  This work is supported by the Foundation of Science and Technology on Information Assurance Laboratory (No.KJ-14-004).
More Information
  • Corresponding author: ZHANG Yu (corresponding author) was born in Shandong Province, China, in 1984. He received the Ph.D. degree from Wuhan University,China,in 2015. He is an engineer in Science and Technology on Information Assurance Laboratory in Beijing, China. His main research direction is network security. (Email:zy168612@qq.com)
  • Received Date: 2015-11-19
  • Rev Recd Date: 2016-05-21
  • Publish Date: 2018-01-10
  • To guarantee that electronic publications are accessible only to the authorized users via cloud, we propose an Efficient access control scheme (EACS) based on Attribute-based encryption (ABE), which is suitable for fine-grained access control. Compared with existing stateof-the-art schemes, EACS is more practical by following functions. Considering the factor that the user membership may change frequently, EACS has the capability of coping with dynamic membership efficiently. Arbitrary-State is also supported to facilitate the system management and improve efficiency. Besides, we prove in the standard model that the security of EACS is based on the Decisional Bilinear Diffie-Hellman assumption. To evaluate the practicality of EACS, we provide a detailed theoretical performance analysis and a simulation comparison with existing schemes. Both the theoretical analysis and the experimental results show that our proposal is efficient and practical for electronic publishing under cloud environment.
  • loading
  • B.C. Björk and D. Solomon,"The publishing delay in scholarly peer-reviewed journals", Journal of Informetrics, Vol.7, No.4, pp.914-923, 2013.
    I. Bermudez, S. Traverso, M. Mellia, et al., "Exploring the cloud from passive measurements:The Amazon AWS case", Proc. of IEEE INFOCOM, Turin, Italy, pp.230-234, 2013.
    P. Mell and T. Grance, "The NIST definition of cloud computing", Communications of the ACM, Vol.53, No.6, pp.1-7, 2009.
    H. Zhang, B. Li, et al., "A framework for truthful online auctions in cloud computing with heterogeneous user demands", Proc. of IEEE INFOCOM, Turin, Italy, pp.1510-1518, 2013.
    H. Xu and B.C. Li, "Joint request mapping and response routing for geo-distributed cloud services", Proc. of IEEE INFOCOM, Turin, Italy, pp.854-862, 2013.
    F. Wang, J.C. Liu and M.H. Chen, "CALMS:Cloud-assisted live media streaming for globalized demands with time/region diversities", Proc. of IEEE INFOCOM, Orlando, Florida, USA, pp.199-207, 2012.
    C. Wang, K. Ren, et al., "Achieving usable and privacy-assured similarity search over outsourced cloud data", Proc. of IEEE INFOCOM, Orlando, Florida, USA, pp.451-459, 2012.
    A. Sahai and B. Waters, "Fuzzy identity-based encryption", Advances in Cryptology-EUROCRYPT 2005, Aarhus, Denmark, pp.457-473, 2005.
    J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption", Proc. of IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp.321-334, 2007.
    V. Goyal, O. Pandey, A. Sahai, et al., "Attribute-based encryption for fine-grained access control of encrypted data", Proc. of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, pp.89-98, 2006.
    S. Hohenberger and B. Waters, "Attribute-Based Encryption with Fast Decryption", Proc. of Public-Key Cryptography-PKC 2013, Nara, Japan, pp.162-179, 2013
    H. Takabi, J.B. Joshi and G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", Proc. of IEEE Symposium on Security and Privacy, Piscataway, New Jersey, pp.24-31, 2010.
    L.M. Kaufman, "Data security in the world of cloud computing", Proc. of IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp.61-64, 2009.
    B. Waters, "Ciphertext-policy attribute-based encryption:An expressive, efficient, and provably secure realization", Proc. of Public Key Cryptography-PKC 2011, Taormina, Italy, pp.53-70, 2011.
    K. Yang, X.H. Jia, K. Ren, et al., "DAC-MACS:Effective data access control for multi-authority cloud storage systems", Proc. of IEEE INFOCOM, Turin, Italy, pp.2895-2903, 2013.
    P. Xu, Y. Tang, W.B. Jiang, et al., "Ciphertext-Policy Attribute-Based Encryption with Short Keys", Chinese Journal of Electronics, Vol.23, No.4, pp.655-660, 2014.
    C.I. Fan, S.M. Huang and H.M. Ruan, "Arbitrary-state attribute-based encryption with dynamic membership", IEEE Transactions on Computers, Vol.63, No.8, pp.1951-1961, 2014.
    J. Baek, W. Susilo and J. Zhou, "New constructions of fuzzy identity-based encryption", Proc. of the 2nd ACM Symposium on Information, Computer and Communications Security, Singapore, pp.368-370, 2007.
    S. Yu, C. Wang, K. Ren, et al., "Achieving secure, scalable, and fine-grained data access control in cloud computing", Proc. of IEEE INFOCOM, San Diego, California, USA, pp.1-9, 2010.
    R. Canetti, O. Goldreich and S. Halevi, "The random oracle methodology, revisited", Journal of the ACM (JACM), Vol.51, No.4, pp.557-594, 2004.
    B. Lynn, "The pairing-based cryptography (PBC) library", http://crypto.stanford.edu/pbc, 2012.
    B. Waters, "Efficient identity-based encryption without random oracles", Advances in Cryptology-EUROCRYPT 2005, Aarhus, Denmark, pp.114-127, 2005.
    M. Li, S. Yu, Y. Zheng, et al., "Scalable and secure sharing of personal health records in cloud computing using attributebased encryption", IEEE Transactions on Parallel and Distributed Systems, Vol.24, No.1, pp.457-473, 2013.
    A. Lewko and B. Waters, "Decentralizing attribute-based encryption", Advances in Cryptology-EUROCRYPT 2011, Tallinn, Estonia, pp.568-588, 2011.
    S. Yu, K. Ren and W. Lou, "FDAC:Toward fine-grained distributed data access control in wireless sensor networks", IEEE Transactions on Parallel and Distributed Systems, Vol.22, No.4, pp.673-686, 2011.
    L.K. Guo, C. Zhang, H. Yue, et al., "A Privacy-preserving Social-assisted Mobile Content Dissemination Scheme in DTNs", Proc. of IEEE INFOCOM, Turin, Italy, pp.2301-2309, 2013.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (457) PDF downloads(212) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return