One enhanced secure access scheme for outsourced data

Yongkai Fan, Jiaxu Liu, Kuan Ching Li, Wei liang, Xia Lei, Gan Tan, Mingdong Tang

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

The popularity of apps makes smart phones rapidly become the most widespread form of communication. Due to the impact of resource constraints in mobile phones, users prefer to outsource data from the local device to the cloud. Access control of outsourced data drives the researches for protecting sensitive data from all the possibly malicious software access or from cloud service provider misbehavior. The unexpected attacks from the local device or the cloud that are trying to breach the data access policy imposed by data owner has resulted in inadequate current access control solutions. Therefore, this paper proposes one access control scheme for Android devices to avoid authentication bypass attacks from both sides. Attribute-Based Encryption is used to design one app-level fine-grained data access for the purpose of data confidentiality in the local side. Moreover, Trusted Execution Environment is employed as a trusted computing environment which provides essential security services to protect encrypted data from unwanted access by cloud service providers or unauthorized apps from the local side. Finally, a prototype system is implemented and the performance is evaluated by the various operations used in the scheme. The experimental results show that the enhanced secure access model is flexible, efficient and secure for outsourcing data to the cloud.

Original languageEnglish (US)
Pages (from-to)230-242
Number of pages13
JournalInformation Sciences
Volume561
DOIs
StatePublished - Jun 2021

All Science Journal Classification (ASJC) codes

  • Software
  • Control and Systems Engineering
  • Theoretical Computer Science
  • Computer Science Applications
  • Information Systems and Management
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'One enhanced secure access scheme for outsourced data'. Together they form a unique fingerprint.

Cite this