FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing

被引:15
作者
Wang, Lili [1 ]
Lin, Ye [1 ]
Yao, Ting [1 ]
Xiong, Hu [1 ,2 ]
Liang, Kaitai [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn Network & Data Secur, Key Lab Sichuan Prov, Chengdu 610054, Peoples R China
[2] Adv Cryptog & Syst Secur Key Lab Sichuan Prov, Chengdu 610025, Peoples R China
[3] Delft Univ Technol, Fac Elect Engn Math & Comp Sci, NL-2628 CD Delft, Netherlands
基金
中国国家自然科学基金;
关键词
Cloud computing; Fabrics; Public key; Encryption; Transforms; Servers; Security; cross-domain data sharing; encrypted data sharing; privacy; security; PROXY RE-ENCRYPTION; PRIME-ORDER GROUPS; ACCESS-CONTROL; EFFICIENT; SCHEME;
D O I
10.1109/TDSC.2023.3240820
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Existing proxy re-encryption (PRE) schemes to secure cloud data sharing raise challenges such as supporting the heterogeneous system efficiently and achieving the unbounded feature. To address this problem, we proposed a fast and secure unbounded cross-domain proxy re-encryption scheme, named FABRIC, which enables the delegator to authorize the semi-trusted cloud server to convert one ciphertext of an identity-based encryption (IBE) scheme to another ciphertext of an attribute-based encryption (ABE) scheme. As the first scheme to achieve the feature mentioned above, FABRIC not only enjoys constant computation overhead in the encryption, decryption, and re-encryption phases when the quantity of attributes increases, but is also unbounded such that the new attributes or roles could be adopted into the system anytime. Furthermore, FABRIC achieves adaptive security under the decisional linear assumption (DLIN). Eventually, detailed theoretical and experimental analysis proved that FABRIC enjoys excellent performance in efficiency and practicality in the cloud computing scenario.
引用
收藏
页码:5130 / 5142
页数:13
相关论文
共 51 条
  • [1] FAME: Fast Attribute-based Message Encryption
    Agrawal, Shashank
    Chase, Melissa
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 665 - 682
  • [2] Security in cloud computing: Opportunities and challenges
    Ali, Mazhar
    Khan, Samee U.
    Vasilakos, Athanasios V.
    [J]. INFORMATION SCIENCES, 2015, 305 : 357 - 383
  • [3] Amazon, 2021, Amazon simple storage service (Amazon s3)
  • [4] [Anonymous], 2010, P 5 ACM S INF COMP C
  • [5] [Anonymous], 2006, The Pairing-Based Cryptographic Library (PBC)
  • [6] Anthes G, 2010, COMMUN ACM, V53, P16, DOI [10.1145/183967B.1B39B83, 10.1145/1839676.1839683]
  • [7] Apple, 2021, iCloud
  • [8] A View of Cloud Computing
    Armbrust, Michael
    Fox, Armando
    Griffith, Rean
    Joseph, Anthony D.
    Katz, Randy
    Konwinski, Andy
    Lee, Gunho
    Patterson, David
    Rabkin, Ariel
    Stoica, Ion
    Zaharia, Matei
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (04) : 50 - 58
  • [9] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
  • [10] Ateniese G, 2009, LECT NOTES COMPUT SC, V5473, P279, DOI 10.1007/978-3-642-00862-7_19