JISE


  [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16]


Journal of Information Science and Engineering, Vol. 33 No. 3, pp. 695-712


Computation Efficient Attribute Based Broadcast Group Key Management for Secure Document Access in Public Cloud


PERUMAL PANDIARAJA1, PANDI VIJAYAKUMAR2,*
VARADARAJAN VIJAYAKUMAR3 AND RAMAN SESHADHRI4
1Department of Computer Science and Engineering
Arunai Engineering College
Thiruvannamalai, 606603 India

2Department of Computer Science and Engineering
University College of Engineering Tindivanam 
Melpakkam, Tamilnadu, 604001 India

3School of Computing Science and Engineering
VIT University
Chennai Campus, 600127 India 

4GAVS Technologies Pvt. Limited
Chennai, 600119 India
E-mail: {sppandiaraja; vijibond2000; seshadhri.raman21}@gmail.com; vijayakumar.v@vit.ac.in


An efficient fine-grained encryption-based access control scheme for documents stored in the public cloud network proposed by Mohamed et al. utilizes more computational and storage complexities. Although, Mohamed et al.’s broadcast key management scheme communicates group key securely, it consumes massive computational and storage resources for frequently changing the group key. In order to avoid these problems, we have proposed a new broadcast group key management scheme that takes reduced computational resources by performing minimal cryptographic operations in the data owner and cloud user’s to update and recover the group key using a matrix called access control vector. The computation complexity of the data owner is reduced by performing simple arithmetic operations for updating the group key. Moreover, the computational complexity of the cloud user is also minimized by performing only one addition and two subtraction operations whenever there is a change in the group or access control policy. In addition, the proposed scheme also minimizes the storage complexity of cloud users, but maintains the same communication complexity as that of Mohamed et al.’s scheme. The performance results show that the proposed scheme is computationally efficient in the data owner and the cloud users.


Keywords: access controls, cryptographic controls, data encryption, data sharing, com-putation time

  Retrieve PDF document (JISE_201703_06.pdf)