Enabling Privacy-Preserving Data Sharing with Bilateral Access Control for Cloud

被引:2
作者
Wu, Tong [1 ]
Ma, Xiaochen [2 ]
Yan, Hailun [3 ,4 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp Sci & Commun Engn, Beijing 100083, Peoples R China
[2] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100811, Peoples R China
[3] Univ Chinese Acad Sci, Sch Crypotol, Beijing 101408, Peoples R China
[4] China Ind Control Syst Cyber Emergency Response Te, Beijing 100040, Peoples R China
基金
中国国家自然科学基金;
关键词
bilateral access control; cloud computing; identity-based matchmaking encryption; privacy preservation; EFFICIENT; INTERNET; THINGS;
D O I
10.3390/electronics12234798
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing plays an essential role in various fields. However, the existing cloud services face a severe challenge, which is how to share the data among a large scale of devices securely. In this paper, we introduce a cloud-based privacy-preserving data sharing scheme, derived from identity-based matchmaking encryption. In our scheme, the access policies are designed by both the sender and receiver simultaneously, to support bilateral access control. To improve efficiency, we delegate the match algorithm to the cloud server, reducing the computation cost and communication overhead on end devices without revealing the users' privacy. Through formal security analysis, we show that our scheme holds security, authenticity, and privacy. Finally, we evaluate our scheme by conducting extensive experiments, indicating that our scheme is more efficient than the other data-sharing schemes in ME-based services in a real-world dataset.
引用
收藏
页数:21
相关论文
共 31 条
[1]   Match Me if You Can: Matchmaking Encryption and Its Applications [J].
Ateniese, Giuseppe ;
Francati, Danilo ;
Nunez, David ;
Venturi, Daniele .
JOURNAL OF CRYPTOLOGY, 2021, 34 (03)
[2]   Sorting of Fully Homomorphic Encrypted Cloud Data: Can Partitioning be Effective? [J].
Chatterjee, Ayantika ;
Sengupta, Indranil .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (03) :545-558
[3]   CL-ME: Efficient Certificateless Matchmaking Encryption for Internet of Things [J].
Chen, Biwen ;
Xiang, Tao ;
Ma, Mimi ;
He, Debiao ;
Liao, Xiaofeng .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (19) :15010-15023
[4]   Access Control Encryption: Enforcing Information Flow with Cryptography [J].
Damgard, Ivan ;
Haagh, Helene ;
Orlandi, Claudio .
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 :547-576
[5]   Cloud Manufacturing: Security, Privacy and Forensic Concerns [J].
Esposito, Christian ;
Castiglione, Aniello ;
Martini, Ben ;
Choo, Kim-Kwang Raymond .
IEEE CLOUD COMPUTING, 2016, 3 (04) :16-22
[6]   Identity-Based Matchmaking Encryption Without Random Oracles [J].
Francati, Danilo ;
Guidi, Alessio ;
Russo, Luigi ;
Venturi, Daniele .
PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 :415-435
[7]   A Semantically Rich Framework to Automate Cloud Service Level Agreements [J].
Ganapathy, Divya Natolana ;
Joshi, Karuna Pande .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (01) :53-64
[8]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[9]   The construction of smart city information system based on the Internet of Things and cloud computing [J].
Jiang, Dingfu .
COMPUTER COMMUNICATIONS, 2020, 150 :158-166
[10]  
Lampson B. W., 1969, Proceedings of the 1969 fall joint computer conference, P27, DOI 10.1145/1478559.1478563