Visible to the public Controlling Cloud Data Access Privilege: Cryptanalysis and Security Enhancement

TitleControlling Cloud Data Access Privilege: Cryptanalysis and Security Enhancement
Publication TypeConference Paper
Year of Publication2017
AuthorsBaseri, Y., Hafid, A., Togou, M. A., Cherkaoui, S.
Conference Name2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
Date Publishedoct
KeywordsAccess Control, attribute-based encryption, authorisation, authorities collusion attack, authority collusion attacks, cloud computing, cloud data access privilege, Collaboration, Computational modeling, cryptanalysis, cryptography, data access privilege scheme, data privacy, Encryption, finegrained access control, Gold, Human Behavior, human factors, identity privacy, Metrics, Outsourcing Decryption, policy-based governance, pubcrawl, resilience, Resiliency, security enhancement, security weaknesses, user anonymity, user anonymity protection, user authorization, user collusion attacks

Recently, Jung et al. [1] proposed a data access privilege scheme and claimed that their scheme addresses data and identity privacy as well as multi-authority, and provides data access privilege for attribute-based encryption. In this paper, we show that this scheme, and also its former and latest versions (i.e. [2] and [3] respectively) suffer from a number of weaknesses in terms of finegrained access control, users and authorities collusion attack, user authorization, and user anonymity protection. We then propose our new scheme that overcomes these shortcomings. We also prove the security of our scheme against user collusion attacks, authority collusion attacks and chosen plaintext attacks. Lastly, we show that the efficiency of our scheme is comparable with existing related schemes.

Citation Keybaseri_controlling_2017