Privilege separation of data sharing scheme using attribute-based encryption
Papers|更新时间:2024-06-05
|
Privilege separation of data sharing scheme using attribute-based encryption
Journal on CommunicationsVol. 35, Issue Z2, Pages: 53-62(2014)
作者机构:
西安电子科技大学 综合业务网理论及关键技术国家重点实验室,陕西 西安 710071
作者简介:
基金信息:
The National Natural Science Foundation of China(61303218);The National Natural Science Foundation of China(61272457);Fundamental Research Foundations for the Central Universities of China(K5051301017);The National Mobile Communication Major Project(2012ZX03002003-002);The 111 Project(B08038)
Hui ZHU, Wan LEI, Rong HUANG, et al. Privilege separation of data sharing scheme using attribute-based encryption[J]. Journal on Communications, 2014, 35(Z2): 53-62.
DOI:
Hui ZHU, Wan LEI, Rong HUANG, et al. Privilege separation of data sharing scheme using attribute-based encryption[J]. Journal on Communications, 2014, 35(Z2): 53-62. DOI: 10.3969/j.issn.1000-436x.2014.z2.009.
Privilege separation of data sharing scheme using attribute-based encryption
which can provide fine-grained access control and flexible one-to-many encryption
has been envisioned as an important data sharing approach to achieve privacy preserving in the distributed environment.However
the flourish of the data sharing approach using attribute-based encryption still hinges upon how to fully understand and manage the challenges facing in the distributed environment
especially the veracity of the data.In fact
all of the existing data sharing schemes allow data owner to modify data without restrictions
in which the veracity of the data has been questioned and that cannot satisfy the demands of practical application sometimes
such as personal electronic medical records or assessment systems.A data sharing scheme with privilege separation is presented
in which the veracity of the data can be ensured and the flexible access control can be provided.Based on RSA-based proxy encryption
a new efficient privilege separation mechanism is introduced to ensure the veracity of the data; exploiting attribute-based encryption
the data owner can define the access policy to achieve fine-grained access control.Detailed security analysis shows that the proposed data sharing scheme can provide the data confidentiality to achieve privacy preserving.In addition
the performance analysis demonstrates the scheme’s effectiveness in terms of the computation costs.
关键词
Keywords
references
ARMBRUST M , FOX A , GRIFFITH R , et al . A view of cloud computing [J ] . Communications of the ACM , 2010 , 53 ( 4 ): 50 - 58 .
ZHU H , LI H , SU W L , et al . ID-based wireless authentication scheme with anonymity [J ] . Journal on Communications , 2009 , 30 ( 4 ): 130 - 136 .
AGRAWAL R , SRIKANT R . Privacy-preserving data mining [J ] . ACM Sigmod Record , 2000 , 29 ( 2 ): 439 - 450 .
ZHU H , LIU T T , Wei G H , et al . PPAS:privacy protection authentication scheme for VANET [J ] . Cluster Computing , 2013 , 16 ( 4 ): 873 - 886 .
SAHAI A , WATERS B . Fuzzy identity-based encryption [M ] . Advances in Cryptology–EUROCRYPT 2005 . Springer Berlin Heidelberg , 2005 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [A ] . Security and Privacy,SP'07 [C ] . 2007 . 321 - 334 .
YU S , WANG C , REN K , et al . Achieving secure,scalable,and fine-grained data access control in cloud computing [A ] . INFOCOM,2010 Proceedings IEEE [C ] . 2010 . 1 - 9 .
LI M , YU S , ZHENG Y , et al . Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption [J ] . IEEE Transactions on Parallel and Distributed Systems , 2013 , 24 ( 1 ): 131 - 143 .
AKINYELE J A , PAGANO M W , GREEN M D , et al . Securing electronic medical records using attribute-based encryption on mobile devices [A ] . Proceedings of the 1st ACM workshop on Security and Privacy in Smartphones and Mobile devices[C].ACM . 2011 . 75 - 86 .
NARAYAN S , GAGNE M,SAFAVI-NANINI R . Privacy preserving EHR system using attribute-based infrastructure [A ] . Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop .[C ] . ACM . 2010 . 47 - 52 .
JAHID S , MITTAL P , BORISOV N . EASIER:Encryption-based access control in social networks with efficient revocation [A ] . Proceedings of the 6th ACM Symposium on Information,Computer and Communications Security [C ] . ACM . 2011 . 411 - 415 .
XU Z , MARTIN K M . Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage [A ] . 2012 IEEE 11th International Conference on Trust,Security and Privacy in Computing and Communications [C ] . 2012 . 844 - 849 .
HUR J , NOH D K . Attribute-based access control with efficient revocation in data outsourcing system [J ] . IEEE Transactions on Parallel and Distributed Systems , 2011 , 22 ( 7 ): 1214 - 1221 .
DONG C , RUSSELLO G , DULAY N . Shared and searchable encrypted data for untrusted servers [M ] . Data and Applications Security XXII . Springer Berlin Heidelberg , 2008 .
YANG Y , LU H , WENG J . Multi-user private keyword search for cloud computing [A ] . 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom) .[C ] . IEEE . 2011 . 264 - 271 .
BEN L . PBC library [EB/OL ] . http://crypto.stanford.edu/pbc/,2013 http://crypto.stanford.edu/pbc/,2013 .
Openssl Team OpenSSL:The open source toolkit for SSL/TLS [EB/OL ] . http://www.openssl.org,2013 http://www.openssl.org,2013 .
BETHENCOURT J , SAHAI A , WATERS B . The cpabe toolkit [EB/OL ] . http://acsc.csl.sri.com /cpabe/,2013 http://acsc.csl.sri.com /cpabe/,2013 .