Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks

被引:4
作者
Hahn, Changhee [1 ]
Kim, Jongkil [2 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Elect & Informat Engn, Seoul 01811, South Korea
[2] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
来源
IEEE INTERNET OF THINGS JOURNAL | 2022年 / 9卷 / 22期
基金
新加坡国家研究基金会;
关键词
Cloud computing; Servers; Cryptography; Encryption; Costs; Internet of Things; Generators; encryption; privacy; security; ATTRIBUTE-BASED ENCRYPTION; SECURITY;
D O I
10.1109/JIOT.2022.3181684
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud-based Internet of Things (IoT) management services can be utilized to acquire data from devices at any point on Earth. Accordingly, controlling access to data managed by possibly untrusted cloud servers is crucial. Attribute-based encryption (ABE) provides flexible access control and the capability to delegate, facilitating decryption operations with high computationally costs to be outsourced to cloud servers. Earlier studies discussed guarantees to the accuracy of delegated computation through various cryptographic encoding techniques, thus helping data receivers verify the precision of outsourced decryption operations. In this article, we investigate two state-of-the-art schemes addressing verifiable outsourced decryption of encrypted data, and show their vulnerability to our verification bypassing attacks. We then propose a securitywise enhanced encoding scheme that disables such attacks. In addition, a rigorous security analysis is conducted, demonstrating the capabilities of the proposed scheme against bypassing attacks. An experimental analysis finds that the method proposed in this article outperforms the two state-of-the-art works by 82% and 87%, respectively, on the encoding computation cost.
引用
收藏
页码:22559 / 22570
页数:12
相关论文
共 37 条
  • [1] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [2] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
  • [3] Camenisch J, 2007, LECT NOTES COMPUT SC, V4515, P246
  • [4] Carofiglio G., 2011, Proceedings of the 2011 23rd International Teletraffic Congress (ITC 2011), P111
  • [5] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
  • [6] Copeland M., 2015, Microsoft Azure, P3, DOI DOI 10.1007/978-1-4842-1043-7
  • [7] De Caro A, 2011, IEEE SYMP COMP COMMU
  • [8] Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV
    Feng, Chaosheng
    Yu, Keping
    Aloqaily, Moayad
    Alazab, Mamoun
    Lv, Zhihan
    Mumtaz, Shahid
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) : 13784 - 13795
  • [9] Ferraral AL, 2009, LECT NOTES COMPUT SC, V5473, P309, DOI 10.1007/978-3-642-00862-7_21
  • [10] Goyal V., 2006, P 2006 INT C PRIVACY, P1