Controlling Cloud Data Access Privilege: Cryptanalysis and Security Enhancement
Title | Controlling Cloud Data Access Privilege: Cryptanalysis and Security Enhancement |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Baseri, Y., Hafid, A., Togou, M. A., Cherkaoui, S. |
Conference Name | 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) |
Date Published | oct |
Keywords | Access Control, attribute-based encryption, authorisation, authorities collusion attack, authority collusion attacks, cloud computing, cloud data access privilege, Collaboration, Computational modeling, cryptanalysis, cryptography, data access privilege scheme, data privacy, Encryption, finegrained access control, Gold, Human Behavior, human factors, identity privacy, Metrics, Outsourcing Decryption, policy-based governance, pubcrawl, resilience, Resiliency, security enhancement, security weaknesses, user anonymity, user anonymity protection, user authorization, user collusion attacks |
Abstract | Recently, Jung et al. [1] proposed a data access privilege scheme and claimed that their scheme addresses data and identity privacy as well as multi-authority, and provides data access privilege for attribute-based encryption. In this paper, we show that this scheme, and also its former and latest versions (i.e. [2] and [3] respectively) suffer from a number of weaknesses in terms of finegrained access control, users and authorities collusion attack, user authorization, and user anonymity protection. We then propose our new scheme that overcomes these shortcomings. We also prove the security of our scheme against user collusion attacks, authority collusion attacks and chosen plaintext attacks. Lastly, we show that the efficiency of our scheme is comparable with existing related schemes. |
URL | https://ieeexplore.ieee.org/document/8292632 |
DOI | 10.1109/PIMRC.2017.8292632 |
Citation Key | baseri_controlling_2017 |
- Gold
- user collusion attacks
- user authorization
- user anonymity protection
- user anonymity
- security weaknesses
- security enhancement
- Resiliency
- resilience
- pubcrawl
- policy-based governance
- Outsourcing Decryption
- Metrics
- identity privacy
- Human Factors
- Human behavior
- Access Control
- finegrained access control
- encryption
- data privacy
- data access privilege scheme
- Cryptography
- cryptanalysis
- Computational modeling
- collaboration
- cloud data access privilege
- Cloud Computing
- authority collusion attacks
- authorities collusion attack
- authorisation
- attribute-based encryption