4.6 Article

White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively

期刊

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2016.2608343

关键词

Ciphertext-policy attribute-based encryption; cloud storage; outsourced data security; white-box traceablity; commitment

资金

  1. Natural Science Foundation of China [61632012, 61672239, 61371083, 61373154, 61411146001, 61402282]
  2. Prioritized Development Projects of the Specialized Research Fund for the Doctoral Program of Higher Education of China [20130073130004]
  3. Shanghai Science and Technology Commission [16511101400, 14YF1410400]

向作者/读者索取更多资源

Ciphertext-policy attribute-based encryption (CP-ABE) has been proposed to enable fine-grained access control on encrypted data for cloud storage service. In the context of CP-ABE, since the decryption privilege is shared by multiple users who have the same attributes, it is difficult to identify the original key owner when given an exposed key. This leaves the malicious cloud users a chance to leak their access credentials to outsourced data in clouds for profits without the risk of being caught, which severely damages data security. To address this problem, we add the property of traceability to the conventional CP-ABE. To catch people leaking their access credentials to outsourced data in clouds for profits effectively, in this paper, we first propose two kinds of non-interactive commitments for traitor tracing. Then we present a fully secure traceable CP-ABE system for cloud storage service from the proposed commitment. Our proposed commitments for traitor tracing may be of independent interest, as they are both pairing-friendly and homomorphic. We also provide extensive experimental results to confirm the feasibility and efficiency of the proposed solution.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据