4.7 Article

Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2017.2738601

关键词

Outsourced attribute-based encryption; cloud computing; auditability; access control; key-leakage resistance

资金

  1. National Research Foundation, Prime Minister's Office, Singapore, under its Corporate Laboratory@University Scheme, National University of Singapore
  2. Singapore Telecommunications Ltd.
  3. National Natural Science Foundation of China [61371083, 61632012, 61373154, 61672239, 61402282]
  4. Shanghai high technology field project [16511101400]
  5. NSFC-Zhejiang Joint Fund for the Integration of Industrialization and Informatization [U1509219]
  6. Shanghai Youth Talent Development Program [14YF1410400]
  7. Engineering and Physical Sciences Research Council [EP/R006938/1] Funding Source: researchfish
  8. EPSRC [EP/R006938/1] Funding Source: UKRI

向作者/读者索取更多资源

As a sophisticated mechanism for secure fine-grained access control over encrypted data, ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising candidates for cloud computing applications. However, there exist two main long-lasting open problems of CP-ABE that may limit its wide deployment in commercial applications. One is that decryption yields expensive pairing cost which often grows with the increase of access policy size. The other is that one is granted access privilege for unlimited times as long as his attribute set satisfies the access policy of a given ciphertext. Such powerful access rights, which are provided by CP-ABE, may be undesirable in real-world applications (e.g., pay-as-you-use). To address the above drawbacks, in this paper, we propose a new notion called auditable sigma-time outsourced CP-ABE, which is believed to be applicable to cloud computing. In our notion, expensive pairing operation incurred by decryption is offloaded to cloud and meanwhile, the correctness of the operation can be audited efficiently. Moreover, the notion provides sigma-time fine-grained access control. The cloud service provider may limit a particular set of users to enjoy access privilege for at most sigma times within a specified period. As of independent interest, the notion also captures key-leakage resistance. The leakage of a user's decryption key does not help a malicious third party in decrypting the ciphertexts belonging to the user. We design a concrete construction (satisfying our notion) in the key encapsulation mechanism setting based on Rouselakis and Waters (prime order) CP-ABE, and further present security and extensive experimental analysis to highlight the scalability and efficiency of our construction.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据