TY - GEN
T1 - Security Enhanced Cloud Storage Access Control System Based on Attribute Based Encryption
AU - Wang, Yong
AU - Sun, Qingyu
AU - Ma, Yuan
AU - Zhang, Ji
AU - Liu, Zhenyan
AU - Xue, Jingfeng
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/11/26
Y1 - 2018/11/26
N2 - With the rapid development of Internet cloud computing technology, services such as cloud storage and cloud disk become a user data storage and backup tool. But at the same time, security of user data has also been great threatened. In this condition, a security enhanced cloud storage access control system based on attributes has been designed and implemented. The system generates the access policy on the client side, implements the access control through the XACML framework, stores user data by using symmetric encryption mechanism at first. The attribute-based encryption mechanism is used to protect the small-scale data-symmetric encryption Key, the data stored in the cloud, provides cloud storage users a safe, flexible, fine-grained and scalable access control function. According to the experimental results, the system can meet the functional requirements, provide a secure access control function. It's in line with the design expectations at security and performance.
AB - With the rapid development of Internet cloud computing technology, services such as cloud storage and cloud disk become a user data storage and backup tool. But at the same time, security of user data has also been great threatened. In this condition, a security enhanced cloud storage access control system based on attributes has been designed and implemented. The system generates the access policy on the client side, implements the access control through the XACML framework, stores user data by using symmetric encryption mechanism at first. The attribute-based encryption mechanism is used to protect the small-scale data-symmetric encryption Key, the data stored in the cloud, provides cloud storage users a safe, flexible, fine-grained and scalable access control function. According to the experimental results, the system can meet the functional requirements, provide a secure access control function. It's in line with the design expectations at security and performance.
KW - XACML
KW - access control
KW - attribute based encryption
KW - cloud storage
UR - http://www.scopus.com/inward/record.url?scp=85059965920&partnerID=8YFLogxK
U2 - 10.1109/BDAI.2018.8546677
DO - 10.1109/BDAI.2018.8546677
M3 - Conference contribution
AN - SCOPUS:85059965920
T3 - International Conference on Big Data and Artificial Intelligence, BDAI 2018
SP - 52
EP - 57
BT - International Conference on Big Data and Artificial Intelligence, BDAI 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2018 International Conference on Big Data and Artificial Intelligence, BDAI 2018
Y2 - 22 June 2018 through 24 June 2018
ER -