P2KASE A2-privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegation

被引:4
作者
Padhya, Mukti [1 ]
Jinwala, Devesh C. [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol SVNIT, Dept Comp Engn, Surat, India
关键词
cloud computing; authorisation; data privacy; cryptography; data owner; fine-grained multidelegation; privacy-preserving key aggregate searchable encryption; P-2 KASE A(2); authentication; access control; cloud server; PROXY RE-ENCRYPTION; KEYWORD;
D O I
10.1049/iet-ifs.2020.0070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Delegation is a technique that allows a subject receiving a delegation (the delegatee) to act on behalf of the delegating subject (the delegator). Although the existing Key Aggregate Searchable Encryption (KASE) schemes support delegation of search rights over any set of ciphertexts using a key of constant-size, two critical issues still should be considered. Firstly, an adversary can intercept the aggregate key or query trapdoor from the insecure communication channels involving the cloud server and impersonate as an authorized user to the server for accessing the data. Secondly, the existing KASE schemes only discuss the delegation of rights from the data owner to other users. However, if a subject receiving a delegation cannot perform the time-critical task on the shared data because of the unavailability, it becomes necessary for the delegatee to further delegate his received rights to another user. In this paper, we propose a novel KASE scheme that allows a fine-grained multi-delegation, i.e., if the attributes of the delegatee satisfy the hidden access policy (defined by the data owner), the delegatee can delegate his received rights to another user, without compromising data privacy. The proposed scheme provides security against the impersonation attack by verifying the user's authentication.
引用
收藏
页码:704 / 723
页数:20
相关论文
共 41 条
[1]  
[Anonymous], 1994, ADV CRYPTOLOGY CRYPT, DOI DOI 10.1007/3-540-48329-2
[2]  
[Anonymous], 2015, NETW COMMUN ENG
[3]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[4]  
Chame S.D., 2015, INT RES J ENG TECHNO, V7
[5]  
Chen X., 2011, Int. J. Comput. Netw. Inf. Secur., V3, P50
[6]  
Cheon JH, 2006, LECT NOTES COMPUT SC, V4004, P1
[7]   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage [J].
Chu, Cheng-Kang ;
Chow, Sherman S. M. ;
Tzeng, Wen-Guey ;
Zhou, Jianying ;
Deng, Robert H. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) :468-477
[8]   Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage [J].
Cui, Baojiang ;
Liu, Zheli ;
Wang, Lingyu .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2374-2385
[9]  
Dang H, 2016, P 4 ACM WORKSH INF H, P69
[10]  
De Caro A, 2011, IEEE SYMP COMP COMMU