Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage

被引:38
作者
Zhang, Zhiting [1 ]
Zeng, Peng [1 ]
Pan, Bofeng [1 ]
Choo, Kim-Kwang Raymond [2 ,3 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[3] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2020年 / 7卷 / 10期
关键词
Cloud computing; Encryption; Internet of Things; Access control; Computer security; Accountability; attribution-based encryption; cloud storage; key abuse; key escrow; large universe; public traceability; selectively security; ACCESS-CONTROL; CP-ABE; VERIFIABILITY;
D O I
10.1109/JIOT.2020.2986303
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) can be utilized to achieve both data security and fine-grained access control in a cloud computing environment. However, we need to consider the risks of key abuse and key escrow in such a setting. Specifically, the former risk category includes the illegal sharing of user's keys (i.e., user key abuse) and illegal key distribution by an authority (i.e., authority key abuse), and the latter includes the scenario where some ciphertext is decrypted by the authority without the user's approval. Hence, in this article, we seek to address both key abuse and key escrow concerns when deploying ABE in a cloud computing environment. In our construction, two authorities [i.e., a key generation center (KGC) and an attribute authority (AA)] participate in the generation of the user's secret key. Both KGC and AA will not know the full decryption key or have the capability to forge one. As a result, neither KGC nor AA can illegally distribute the user's private key to unauthorized users or decrypt user's ciphertexts without the user's approval. In addition, in our scheme, any private keys modified by malicious users cannot be successfully used for decryption. In the event that some user illegally shares his/her original private key, the scheme has in place a mechanism to trace the abused private key (since the user's identity information is embedded in the private key). Hence, our scheme supports public traceability, key abuse, and key escrow. In addition, our scheme is based on prime order bilinear groups, and is shown to be selectively secure in the standard model.
引用
收藏
页码:10314 / 10323
页数:10
相关论文
共 41 条
[1]  
Au MH, 2008, LECT NOTES COMPUT SC, V5037, P94
[2]  
Beimel A., 1996, 2004180 FAC COMP SCI
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[5]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[6]   Large universe attribute based access control with efficient decryption in cloud storage system [J].
Fu, Xingbing ;
Nie, Xuyun ;
Wu, Ting ;
Li, Fagen .
JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 135 :157-164
[7]  
Gang Yu, 2017, Cyberspace Safety and Security. 9th International Symposium, CSS 2017. Proceedings: LNCS 10581, P337, DOI 10.1007/978-3-319-69471-9_25
[8]  
Goyal V, 2007, LECT NOTES COMPUT SC, V4622, P430
[9]  
Goyal V, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P427
[10]   Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing [J].
Jiang, Yinhao ;
Susilo, Willy ;
Mu, Yi ;
Guo, Fuchun .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :720-729