Attribute-based fine-grained access control for outscored private set intersection computation

被引:19
作者
Ali, Mohammad [1 ]
Mohajeri, Javad [2 ]
Sadeghi, Mohammad-Reza [1 ]
Liu, Ximeng [3 ,4 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[4] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
关键词
Fine-grained access control; Private set intersection; Cloud computing; Attribute-based encryption; SECURE;
D O I
10.1016/j.ins.2020.05.041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private set intersection (PSI) is a fundamental cryptographic protocol which has a wide range of applications. It enables two clients to compute the intersection of their private datasets without revealing non-matching elements. The advent of cloud computing drives the ambition to reduce computation and data management overhead by outsourcing such computations. However, since the cloud is not trustworthy, some cryptographic methods should be applied to maintain the confidentiality of datasets. But, in doing so, data owners may be excluded from access control on their outsourced datasets. Therefore, to control access rights and to interact with authorized users, they have to be online during the protocol. On the other hand, none of the existing cloud-based PSI schemes support fine-grained access control over outsourced datasets. This paper, for the first time, proposes an attribute-based private set intersection (AB-PSI) scheme providing fine-grained access control. AB-PSI allows a data owner to control intersection computations on its outsourced dataset by defining an access control policy. We also provide security definitions for an AB-PSI scheme and prove the security of our scheme in the standard model. We implement our scheme and report performance evaluation results. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:222 / 243
页数:22
相关论文
共 42 条
  • [1] Efficient Delegated Private Set Intersection on Outsourced Private Datasets
    Abadi, Aydin
    Terzis, Sotirios
    Metere, Roberto
    Dong, Changyu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 608 - 624
  • [2] Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
  • [3] Secure approximation of edit distance on genomic data
    Al Aziz, Md Momin
    Alhadidi, Dima
    Mohammed, Noman
    [J]. BMC MEDICAL GENOMICS, 2017, 10
  • [4] Ali M., 2018, IACR CRYPTOL EPRINT, V2018, P1102
  • [5] [Anonymous], 2018, MOB NETW APPL
  • [6] [Anonymous], 2017, IEEE Trans Serv Comput
  • [7] [Anonymous], 2011, CANCER, DOI DOI 10.1186/1471-2407-11-309
  • [8] [Anonymous], 2017, P 14 INT C SEC CRYPT
  • [9] Asharov Gilad, 2018, Proceedings on Privacy Enhancing Technologies, V2018, P104, DOI 10.1515/popets-2018-0034
  • [10] Ateniese G, 2011, LECT NOTES COMPUT SC, V6571, P156, DOI 10.1007/978-3-642-19379-8_10