Multi-user collaborative access control scheme in cloud storage
Multi-user collaborative access control scheme in cloud storage
Blog Article
CP-ABE was considered as one of most suitable methods of access control in cloud storage.However, it was just fit for reading or modifying different data files respectively.When CP-ABE was applied directly to data access collaborative control by multiple users, there would be such problems Sewing Machines as data being modified disorderly.When multiple users access collaboratively the data stored on the cloud, legitimate users should modify the same ciphertext file orderly on the premise of confidentiality and collusion-resistance and the copies of ciphertext file should be generated as few as possible.Two multi-user collaborative access control schemes MCA-F and MCA-B for the file and its logical blocks each were proposed.
The MCA-F scheme meets the requirement of access control in which the minimal granularity of control is a single data file.In MCA-F scheme, hierarchical encryption is adopted,a part of decrypting computation is transferred to a cloud server to decrease the computational cost on users when decrypting.In allusion to the simultaneous write-data access control of multiple users, a method is designed to manage semi-stored modified data submitted by menders.The MCA-B scheme is used for the access control in which a logical block of the file is the minimal granularity of control.This scheme designs a mechanism of logical blocking of the file and a representing method based on index matrix, and the representation of sub data mask is put forward to describe write permission of multiple Hard Tops users on different logical blocks of the same file.
MCA-B scheme supports the dynamic change of the structure of logical blocks of the file, and the owners or menders do not need to be online always.Compared with the existing schemes, not only do proposed schemes provide multi-user collaborative access control in cloud storage, but also the client storage of reading access control and the computation of encrypting and decrypting are both lesser.