Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage

被引:73
作者
Liang, Kaitai [1 ]
Susilo, Willy [2 ]
Liu, Joseph K. [3 ]
机构
[1] Aalto Univ, Dept Comp Sci, Espoo 02150, Finland
[2] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[3] Monash Univ, Fac Informat Technol, Melbourne, Vic 3800, Australia
基金
中国国家自然科学基金; 芬兰科学院; 澳大利亚研究理事会;
关键词
Privacy; anonymity; proxy re-encryption; big data; IDENTITY-BASED ENCRYPTION; PROXY RE-ENCRYPTION; SECURE; SCHEME; IBE;
D O I
10.1109/TIFS.2015.2419186
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The need of secure big data storage service is more desirable than ever to date. The basic requirement of the service is to guarantee the confidentiality of the data. However, the anonymity of the service clients, one of the most essential aspects of privacy, should be considered simultaneously. Moreover, the service also should provide practical and fine-grained encrypted data sharing such that a data owner is allowed to share a ciphertext of data among others under some specified conditions. This paper, for the first time, proposes a privacy-preserving ciphertext multi-sharing mechanism to achieve the above properties. It combines the merits of proxy re-encryption with anonymous technique in which a ciphertext can be securely and conditionally shared multiple times without leaking both the knowledge of underlying message and the identity information of ciphertext senders/recipients. Furthermore, this paper shows that the new primitive is secure against chosen-ciphertext attacks in the standard model.
引用
收藏
页码:1578 / 1589
页数:12
相关论文
共 36 条
[1]  
[Anonymous], 2012, INT C INFORM SECURIT
[2]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]  
Ateniese G., 2005, NDSS, P29
[4]  
Ateniese G, 2009, LECT NOTES COMPUT SC, V5473, P279, DOI 10.1007/978-3-642-00862-7_19
[5]  
Bellare M, 2007, LECT NOTES COMPUT SC, V4450, P201
[6]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[7]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[8]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[9]  
Boyen X, 2006, LECT NOTES COMPUT SC, V4117, P290
[10]  
Camenisch J, 2009, LECT NOTES COMPUT SC, V5443, P196