Secure and Flexible Data Sharing for Distributed Storage with Efficient Key Management

被引:2
作者
Xue, Liang [1 ]
Liu, Dongxiao [1 ]
Huang, Cheng [1 ]
Shen, Xuemin [1 ]
Zhuang, Weihua [1 ]
Sun, Rob [2 ]
Ying, Bidi [2 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Huawei Technol Canada, Ottawa, ON K2K 3J1, Canada
来源
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022) | 2022年
关键词
Key management; ciphertext update; data sharing; access control; PRIVACY;
D O I
10.1109/ICC45855.2022.9838811
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we propose a Secure and Flexible Data Sharing (SFDS) scheme for distributed storage, where data owners can outsource their data to a distributed storage network and share the data with authorized users. To preserve confidentiality, all data are encrypted by data owners' secret keys before being outsourced, and fine-grained access policies are enforced on the encrypted data (ciphertexts) to achieve flexible data sharing. Furthermore, based on the ciphertext puncturable encryption and the hierarchical identity-based encryption, we design an efficient key and ciphertext update mechanism, which enables data owners to update their secret keys and the corresponding ciphertexts periodically to deal with side-channel attacks and system vulnerabilities. Update tokens are constructed to directly derive new keys and ciphertexts. Through detailed security analysis, it is demonstrated that SFDS can achieve all three essential security properties, i.e., forward security, post-compromise security, and collusion attack resistance.
引用
收藏
页码:4408 / 4413
页数:6
相关论文
共 18 条
[1]  
[Anonymous], 2014, Sia: Simple decentralized storage
[2]   A Survey on Blockchain for Information Systems Management and Security [J].
Berdik, David ;
Otoum, Safa ;
Schmidt, Nikolas ;
Porter, Dylan ;
Jararweh, Yaser .
INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (01)
[3]  
BONEH D, 2005, PROC 24 ANN INT, V3494, P440
[4]  
Cecile Delerablee L. G., 2021, KEY POLICY ABE DELEG
[5]   CCA Updatable Encryption Against Malicious Re-encryption Attacks [J].
Chen, Long ;
Li, Yanan ;
Tang, Qiang .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2020, PT III, 2020, 12493 :590-620
[6]  
filecoin, Filecoin
[7]  
github, Miracl library
[8]  
Goyal V., 2006, PROC ADV 24 ANN INT, P89, DOI [DOI 10.1145/1180405.1180418, 10.1145/1180405.1180418]
[9]   The Direction of Updatable Encryption Does Not Matter Much [J].
Jiang, Yao .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2020, PT III, 2020, 12493 :529-558
[10]  
KLOOSS M, 2019, P ANN INT C THEOR AP, V1476, P68, DOI DOI 10.1007/978-3-030-17653-2_3