An Adaptive Secure and Practical Data Sharing System With Verifiable Outsourced Decryption

被引:4
作者
Xu, Shengmin [1 ,2 ]
Han, Xingshuo [3 ]
Xu, Guowen [4 ]
Ning, Jianting [1 ,2 ,5 ]
Huang, Xinyi [6 ]
Deng, Robert H. [7 ]
机构
[1] Applicat Minist Educ, Key Lab Analyt Math, Fuzhou 350117, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
[4] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[5] City Univ Macau, Fac Data Sci, Taipa 999078, Macao, Peoples R China
[6] Hong Kong Univ Sci & Technol Guangzhou, Artificial Intelligence Thrust, Informat Hub, Guangzhou 511458, Peoples R China
[7] Singapore Management Univ, Sch Comp & Informat Syst, Singapore 188065, Singapore
基金
中国国家自然科学基金;
关键词
Security; Access control; Standards; Encryption; Data models; Adaptive systems; Cloud computing; Adaptive security; fine-grained access control; verifiable outsourced decryption; IDENTITY-BASED ENCRYPTION; EXTRACTORS; FRAMEWORK; HIBE; IBE;
D O I
10.1109/TSC.2023.3321314
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is the widespread acceptance of a promising paradigm offering a substantial amount of storage and data services on demand. To preserve data confidentiality, many cryptosystems have been introduced. However, current solutions are incompatible with the resource-constrained end-devices because of a variety of vulnerabilities in terms of practicality and security. In this article, we propose a practical and secure data-sharing system by introducing a new design of attribute-based encryption with verifiable outsourced decryption-attribute-based encryption (VO-ABE for short). Our system offers: (1) data sharing at a fine-grained level; (2) a scalable key issuing protocol without any secure channel; (3) a verifiable outsourced decryption mechanism for resource-constrained end-devices against the malicious cloud service provider; and (4) adaptive security against the real-world attacks. To formalize our solution with cryptographic analysis, we present the formal definition of VO-ABE and its concrete construction with provable security. In particular, our design leverages the techniques of the traditional ABE, verifiable outsourced decryption, and randomness extractor to support fine-grained access control, cost-effective data sharing, and security assurance with high entropy. Moreover, our design is provably secure in the adaptive model under the standard assumption, which offers a stronger security guarantee since the state-of-the-art solution is selectively secure under the non-standard assumption and suffers from a variety of real-world attacks. The implementation and evaluation demonstrate that our solution enjoys superior functionality and better performance than the relevant solutions. More importantly, our solution is compatible with the resource-constrained end-devices since the decryption mechanism takes around 1.1 ms and is 22.7x faster than the state-of-the-art solution.
引用
收藏
页码:776 / 788
页数:13
相关论文
共 47 条
  • [21] Goyal V., 2006, P 2006 INT C PRIVACY, P1
  • [22] Comparing the pairing efficiency over composite-order and prime-order elliptic curves
    Guillevic, Aurore
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7954 LNCS : 357 - 372
  • [23] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354
  • [24] Lewko A, 2010, LECT NOTES COMPUT SC, V5978, P455, DOI 10.1007/978-3-642-11799-2_27
  • [25] Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing
    Li, Jiguo
    Chen, Ningyu
    Zhang, Yichen
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) : 983 - 993
  • [26] Full Verifiability for Outsourced Decryption in Attribute Based Encryption
    Li, Jiguo
    Wang, Yao
    Zhang, Yichen
    Han, Jinguang
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (03) : 478 - 487
  • [27] Matsuda T, 2013, LECT NOTES COMPUT SC, V7778, P332, DOI 10.1007/978-3-642-36362-7_21
  • [28] Naor M., 1989, Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, P33, DOI 10.1145/73007.73011
  • [29] CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Liang, Kaitai
    Wei, Lifei
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (01) : 111 - 124
  • [30] Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Liang, Kaitai
    Ma, Hui
    Wei, Lifei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (01) : 94 - 105