Attribute-based fine-grained access control for outscored private set intersection computation

被引:19
作者
Ali, Mohammad [1 ]
Mohajeri, Javad [2 ]
Sadeghi, Mohammad-Reza [1 ]
Liu, Ximeng [3 ,4 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[4] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
关键词
Fine-grained access control; Private set intersection; Cloud computing; Attribute-based encryption; SECURE;
D O I
10.1016/j.ins.2020.05.041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private set intersection (PSI) is a fundamental cryptographic protocol which has a wide range of applications. It enables two clients to compute the intersection of their private datasets without revealing non-matching elements. The advent of cloud computing drives the ambition to reduce computation and data management overhead by outsourcing such computations. However, since the cloud is not trustworthy, some cryptographic methods should be applied to maintain the confidentiality of datasets. But, in doing so, data owners may be excluded from access control on their outsourced datasets. Therefore, to control access rights and to interact with authorized users, they have to be online during the protocol. On the other hand, none of the existing cloud-based PSI schemes support fine-grained access control over outsourced datasets. This paper, for the first time, proposes an attribute-based private set intersection (AB-PSI) scheme providing fine-grained access control. AB-PSI allows a data owner to control intersection computations on its outsourced dataset by defining an access control policy. We also provide security definitions for an AB-PSI scheme and prove the security of our scheme in the standard model. We implement our scheme and report performance evaluation results. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:222 / 243
页数:22
相关论文
共 42 条
  • [21] CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud
    Hua, Jiafeng
    Shi, Guozhen
    Zhu, Hui
    Wang, Fengwei
    Liu, Ximeng
    Li, Hao
    [J]. INFORMATION SCIENCES, 2020, 527 (527) : 560 - 575
  • [22] Jun-Qing L, 2013, INT C ELECTR MACH SY, P789, DOI 10.1109/ICEMS.2013.6713151
  • [23] Scaling Private Set Intersection to Billion-Element Sets
    Kamara, Seny
    Mohassel, Payman
    Raykova, Mariana
    Sadeghian, Saeed
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 195 - 215
  • [24] Kerschbaum F., 2012, P 27 ACM S APPL COMP, P1451
  • [25] Kerschbaum F, 2012, 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012)
  • [26] Kissner L, 2005, LECT NOTES COMPUT SC, V3621, P241
  • [27] Encrypted Set Intersection Protocol for Outsourced Datasets
    Liu, Fang
    Ng, Wee Keong
    Zhang, Wei
    Giang, Do Hoang
    Han, Shuguo
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 135 - 140
  • [28] Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
    Liu, Hong
    Ning, Huansheng
    Xiong, Qingxu
    Yang, Laurence T.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (01) : 241 - 251
  • [29] Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
    Miao, Yinbin
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    Li, Jiguo
    Li, Hongwei
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1080 - 1094
  • [30] Enabling verifiable multiple keywords search over encrypted cloud data
    Miao, Yinbin
    Weng, Jian
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Liu, Zhiquan
    Li, Hongwei
    [J]. INFORMATION SCIENCES, 2018, 465 : 21 - 37