Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization

被引:3
作者
Chen, E. [1 ]
Zhu, Yan [1 ]
Liang, Kaitai [2 ]
Yin, Hongjian [1 ]
机构
[1] Univ Sci & Technol Beijing, Dept Sch Comp & Commun Engn, Beijing 10083, Peoples R China
[2] Delft Univ Technol, Cybersecur Grp, NL-2628 XT Delft, Netherlands
基金
中国国家自然科学基金;
关键词
Cryptography; Cloud computing; Encryption; Lattices; Security; Standards; Sparse matrices; cloud file sharing; ABAC; XACML; attribute-based encryption; small policy matrix; ENCRYPTION;
D O I
10.1109/TCC.2021.3104323
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing popularity of remote Cloud File Sharing (CFS) has become a major concern for privacy breach of sensitive data. Aiming at this concern, we present a new resource sharing framework by integrating enterprise-side Attribute-Based Access Control/eXtensible Access Control Markup Language (ABAC/XACML) model, client-side Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme, and cloud-side CFS service. Moreover, the framework workflow is provided to support the encrypted-file writing and reading algorithms in accordance with ABAC/XACML-based access policy and attribute credentials. However, an actual problem of realizing this framework is that policy matrix, derived from access policy, seriously affects the performance of existing CP-ABE from Lattice (CP-ABE-L) schemes. To end it, we present an optimal generation algorithm of Small Policy Matrix (SPM), which only consists of small elements, and generates an all-one reconstruction vector. Based on such a matrix, the improved CP-ABE-L scheme is proposed to reduce the cumulative errors to the minimum and prevent the enlargement of error bounds. Furthermore, we give the optimal estimation of system parameters to implement a valid Error Proportion Allocation (EPA). Our experimental results indicate that our scheme has short size of parameters and enjoys efficient computation and storage overloads. Thus, our new framework with optimization methods is conducive to enhancing the security and efficiency of remote work on CFS.
引用
收藏
页码:579 / 594
页数:16
相关论文
共 27 条
  • [1] Agrawal S, 2012, LECT NOTES COMPUT SC, V7293, P280, DOI 10.1007/978-3-642-30057-8_17
  • [2] Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
  • [3] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    [J]. SENSORS, 2019, 19 (07)
  • [4] Alwen J., 2009, Proceedings of STACS, V09001, P75
  • [5] Barker E, 2016, NIST SPECIAL PUBLICA, V800
  • [6] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [7] Boyen X, 2013, LECT NOTES COMPUT SC, V7785, P122, DOI 10.1007/978-3-642-36594-2_8
  • [8] Cao Z., 2010, IACR CRYPTOLOGY EPRI, V2010, P374
  • [9] Chen L., 2016, REPORT POSTQUANTUM C, V12
  • [10] Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension
    Chen, Long
    Zhang, Zhenfeng
    Wang, Xueqing
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 597 - 627