Blockchain-Assisted Comprehensive Key Management in CP-ABE for Cloud-Stored Data

被引:19
作者
Liu, Suhui [1 ]
Yu, Jiguo [2 ,3 ]
Chen, Liquan [1 ]
Chai, Baobao [4 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211102, Peoples R China
[2] Qilu Univ Technol, Big Data Inst, Jinan 250353, Peoples R China
[3] Qilu Univ Technol, Shandong Fundamental Res Ctr Comp Sci, Jinan 250353, Shandong, Peoples R China
[4] Shandong Univ Sci & Technol, Sch Comp Sci & Engn, Qingdao 266590, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2023年 / 20卷 / 02期
关键词
Ciphertext-policy attribute-based encryption; key management; cloud; blockchain; hyperledger fabric; ATTRIBUTE-BASED ENCRYPTION; THRESHOLD MULTI-AUTHORITY; ACCESS-CONTROL; SCHEME;
D O I
10.1109/TNSM.2022.3185237
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public clouds have drawn increasing attention from academia and industry due to their high computational and storage performance. Attribute-based encryption (ABE) is the most promising technology to simultaneously achieve confidentiality and fine-grained access control of the cloud-stored data. However, traditional ABE that relies on centralized authority faces several key management issues, such as the key escrow, key distribution, key tracking, key update, and heavy communication and computing overhead for users, which will cause security concerns and impede its widespread application. On the other hand, blockchain technology preserves distributed ledgers to ensure the immutability and transparency of data, which can further solve the security vulnerabilities caused by system centralization. This paper proposes a blockchain-assisted transformation method to solve all the key management problems mentioned above in ciphertext-policy ABE by utilizing technologies such as secret sharing protocols. In addition, our transformation method realizes two additional benefits: outsourced decryption and efficient user revocation, which are extremely valuable for practical implementations. We simulate a demonstration by adopting the most popular permissioned blockchain, Hyperledger Fabric. The security and efficiency analysis reveals that the scheme obtained from our transformation method can achieve replayable chosen-ciphertext security with extremely efficient decryption.
引用
收藏
页码:1745 / 1758
页数:14
相关论文
共 48 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P565
[5]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[6]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[7]   SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs [J].
Cheng, Lichen ;
Liu, Jiqiang ;
Xu, Guangquan ;
Zhang, Zonghua ;
Wang, Hao ;
Dai, Hong-Ning ;
Wu, Yulei ;
Wang, Wei .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2019, 6 (06) :1373-1385
[8]   Server-Aided Revocable Attribute-Based Encryption [J].
Cui, Hui ;
Deng, Robert H. ;
Li, Yingjiu ;
Qin, Baodong .
COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 :570-587
[9]   A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud [J].
Eltayieb, Nabeil ;
Elhabob, Rashad ;
Hassan, Alzubair ;
Li, Fagen .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 102
[10]  
Fujisaki E., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P537