Achieving Scalability with Data Owner Anonymity in Cloud Access Control

Authors

  • Abdulqader Ali Bahaj King Fahd University of Petroleum & Minerals, Computer Networks, Saudia Arabia
  • Ahmed M. Abouollo King Fahd University of Petroleum & Minerals, Computer Networks, Saudia Arabia

DOI:

https://doi.org/10.14738/tnc.52.2764

Abstract

Abstract- Cloud computing is a trending technology that enables subscribing organizations to outsource computations and storage, and eliminates the need of purchasing and maintaining the equipment by the organizations themselves. However, it is very challenging to maintain the privacy and security of data especially when the number of users grows dramatically. This paper focuses on achieving a high level of scalability to the cloud, allowing fine-grained access control, preserving the anonymity of the data owner and enabling the end user to verify the integrity of the data uploaded to the cloud. In order to achieve this, this paper proposes an effective scheme that uses Ciphertext Policy Attribute Based Encryption (CP-ABE) combined with identity-based encryption (IBE), and introduces a security mediator which signs files on behalf of the data owner to preserve the data owner’s anonymity from the cloud. This scheme allows the end user to check the integrity of the data on the cloud.

Author Biography

Abdulqader Ali Bahaj, King Fahd University of Petroleum & Minerals, Computer Networks, Saudia Arabia

Student at king fahd university of petroleum & minerals, Computer Networks.

References

(1) Amos Fiat and Moni Naor. Broadcast encryption. In Advances in Cryptology CRYPTO93, pages 480–491. Springer, 1994.

(2) Boyang Wang, Sherman SM Chow, Ming Li, and Hui Li. Storing shared data on the cloud via security-mediator. In Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference on, pages 124–133. IEEE, 2013.

(3) GuojunWang, Qin Liu, and JieWu. Achieving fine-grained access control for secure data sharing on cloud servers. Concurrency and Computation: Practice and Experience, 23(12):1443–1464, 2011.

(4) Jeremy Horwitz and Ben Lynn. Toward hierarchical identity-based encryption. In Advances in Cryptology EUROCRYPT 2002, pages 466–481. Springer, 2002.

(5) Jin-Shu Su, Dan Cao, Xiao-Feng Wang, Yi-Pin Sun, and Qiao-Lin Hu. Attribute based encryption schemes. Journal of Software, 22(6):1299–1315, 2011.

(6) Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. Parallel and Distributed Systems, IEEE Transactions on, 24(1):131–143, 2013.

(7) Santanu Chatterjee, Amit Kumar Gupta, and GV Sudhakar. An efficient dynamic fine grained access control scheme for secure data access in cloud networks. In Electrical, Computer and Communication Technologies (ICECCT), 2015 IEEE International Conference on, pages 1–8. IEEE, 2015.

(8) Song Lingwei, Yu Fang, Zhang Ru, and Niu Xinxin. Method of secure, scalable, and fine-grained data access control with efficient revocation in untrusted cloud. The Journal of China Universities of Posts and Telecommunications, 22(2):38–43, 2015.

(9) Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, and Minglu Li. Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Computers & security, 42:151–164, 2014.

Downloads

Published

2017-05-10

How to Cite

Bahaj, A. A., & Abouollo, A. M. (2017). Achieving Scalability with Data Owner Anonymity in Cloud Access Control. Discoveries in Agriculture and Food Sciences, 5(2), 01. https://doi.org/10.14738/tnc.52.2764