{"title":"Efficient Collaborative Access Control Encryption Scheme for Cloud Storage","authors":"Ran Lingqin;Peng Changgen;Tan Weijie","doi":"10.1109/JIOT.2025.3583009","DOIUrl":null,"url":null,"abstract":"To address the limitations of traditional access control schemes in cloud storage environments—such as high computational and storage overhead, difficulty in supporting collaborative user access, and vulnerability to malicious collusion attacks—this article proposes a Chinese remainder theorem (CRT)-based anti-collusion collaborative access control encryption scheme for cloud storage. Our solution introduces a dynamic authorization mechanism for collaborative nodes, enabling data owners (DOs) to designate collaborative nodes in access policies and generate collaborative secret values. By integrating threshold secret sharing technology, these collaborative secret values are embedded into group user keys. Leveraging the modulus orthogonality of CRT, our scheme imposes two conditions for collaborative access: 1) the attribute sets of group users must satisfy the collaborative access policy and 2) the collaborative secret value shares held by group members must meet a predefined threshold. This design not only supports legitimate collaborative decryption but also automatically identifies cross-group collaboration as a collusion attack without requiring trusted third-party authorities. Security analysis demonstrates that our scheme ensures data confidentiality. Experimental evaluations show significant advantages in computation and storage efficiency compared to typical schemes such as ciphertext-policy ABE (CP-ABE) and CP-WABE-certification authority (CA).","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 17","pages":"36577-36589"},"PeriodicalIF":8.9000,"publicationDate":"2025-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11050888/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
To address the limitations of traditional access control schemes in cloud storage environments—such as high computational and storage overhead, difficulty in supporting collaborative user access, and vulnerability to malicious collusion attacks—this article proposes a Chinese remainder theorem (CRT)-based anti-collusion collaborative access control encryption scheme for cloud storage. Our solution introduces a dynamic authorization mechanism for collaborative nodes, enabling data owners (DOs) to designate collaborative nodes in access policies and generate collaborative secret values. By integrating threshold secret sharing technology, these collaborative secret values are embedded into group user keys. Leveraging the modulus orthogonality of CRT, our scheme imposes two conditions for collaborative access: 1) the attribute sets of group users must satisfy the collaborative access policy and 2) the collaborative secret value shares held by group members must meet a predefined threshold. This design not only supports legitimate collaborative decryption but also automatically identifies cross-group collaboration as a collusion attack without requiring trusted third-party authorities. Security analysis demonstrates that our scheme ensures data confidentiality. Experimental evaluations show significant advantages in computation and storage efficiency compared to typical schemes such as ciphertext-policy ABE (CP-ABE) and CP-WABE-certification authority (CA).
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.