Attribute-based fine-grained access control for outscored private set intersection computation

被引:21
作者
Ali, Mohammad [1 ]
Mohajeri, Javad [2 ]
Sadeghi, Mohammad-Reza [1 ]
Liu, Ximeng [3 ,4 ]
机构
[1] Amirkabir Univ Technol, Dept Math & Comp Sci, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[4] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
关键词
Fine-grained access control; Private set intersection; Cloud computing; Attribute-based encryption; SECURE;
D O I
10.1016/j.ins.2020.05.041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private set intersection (PSI) is a fundamental cryptographic protocol which has a wide range of applications. It enables two clients to compute the intersection of their private datasets without revealing non-matching elements. The advent of cloud computing drives the ambition to reduce computation and data management overhead by outsourcing such computations. However, since the cloud is not trustworthy, some cryptographic methods should be applied to maintain the confidentiality of datasets. But, in doing so, data owners may be excluded from access control on their outsourced datasets. Therefore, to control access rights and to interact with authorized users, they have to be online during the protocol. On the other hand, none of the existing cloud-based PSI schemes support fine-grained access control over outsourced datasets. This paper, for the first time, proposes an attribute-based private set intersection (AB-PSI) scheme providing fine-grained access control. AB-PSI allows a data owner to control intersection computations on its outsourced dataset by defining an access control policy. We also provide security definitions for an AB-PSI scheme and prove the security of our scheme in the standard model. We implement our scheme and report performance evaluation results. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:222 / 243
页数:22
相关论文
共 42 条
[21]  
Jun-Qing L, 2013, INT C ELECTR MACH SY, P789, DOI 10.1109/ICEMS.2013.6713151
[22]   Scaling Private Set Intersection to Billion-Element Sets [J].
Kamara, Seny ;
Mohassel, Payman ;
Raykova, Mariana ;
Sadeghian, Saeed .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :195-215
[23]  
Kerschbaum F., 2012, P 27 ANN ACM S APPL, P1451
[24]  
Kerschbaum F, 2012, 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012)
[25]  
Kissner L, 2005, LECT NOTES COMPUT SC, V3621, P241
[26]   Encrypted Set Intersection Protocol for Outsourced Datasets [J].
Liu, Fang ;
Ng, Wee Keong ;
Zhang, Wei ;
Giang, Do Hoang ;
Han, Shuguo .
2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, :135-140
[27]   Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing [J].
Liu, Hong ;
Ning, Huansheng ;
Xiong, Qingxu ;
Yang, Laurence T. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (01) :241-251
[28]  
Miao Y., 2017, IEEE Trans Serv Comput
[29]   Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting [J].
Miao, Yinbin ;
Liu, Ximeng ;
Choo, Kim-Kwang Raymond ;
Deng, Robert H. ;
Li, Jiguo ;
Li, Hongwei ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1080-1094
[30]   Enabling verifiable multiple keywords search over encrypted cloud data [J].
Miao, Yinbin ;
Weng, Jian ;
Liu, Ximeng ;
Choo, Kim-Kwang Raymond ;
Liu, Zhiquan ;
Li, Hongwei .
INFORMATION SCIENCES, 2018, 465 :21-37