Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing

被引:77
作者
Jiang, Yinhao [1 ]
Susilo, Willy [1 ]
Mu, Yi [1 ]
Guo, Fuchun [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW, Australia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 78卷
关键词
Fog computing; Attribute-based encryption; Key-delegation abuse; Ciphertext-policy; FORENSIC DATA;
D O I
10.1016/j.future.2017.01.026
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In Fog Computing, fragile connection between Fog and Cloud causes problems of the authentication and authorization. Recently, Stojmenovic, Wen, Huang and Luan introduced a potential solution by adopting the concept of Stand-Alone Authentication (SAA) and equipped it with Attribute-based encryption (ABE) for its security in a large and dynamic information system. In such a system, a user's access right can be described as a set of attributes linking to his/her private key. In this paper, we note that if a user can generate a new private key for a portion of his/her access right, this could potentially lead to some undesirable situations, which violates the access control policy. Interestingly, to date, there is no work that looks into this matter in detail nor addresses it. We point out that this is a "property" that exists in ABE systems, which we refer to "key-delegation abuse". ABE systems that suffer from key-delegation abuse will hinder the adoption of these systems in practice. In this work, for the first time in the literature, we address the "key-delegation abuse" problem in Ciphertext-policy Attribute-based Encryption(CPABE) systems. We introduce a new mechanism to enhance CP-ABE schemes that provide protections against this key-delegation abuse issue. We formalize the security requirements for such a property, and subsequently construct a CP-ABE scheme that satisfies the new security requirements. We also present an application of our scheme to a traceable CP-ABE, where the "traitors", i.e. the users who have leaked their keys, can be traced. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:720 / 729
页数:10
相关论文
共 48 条
  • [1] Ab Rahman N. H., 2016, CONCURR COMPUT PRACT
  • [2] [Anonymous], 2013, Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, MCC '13, DOI [10.1145/2491266.2491270, DOI 10.1145/2491266.2491270]
  • [3] [Anonymous], ATTRIBUTE BASED ENCR
  • [4] [Anonymous], DATA EXFILTRATION IN
  • [5] [Anonymous], 2008, IACR Cryptol. ePrint Arch
  • [6] [Anonymous], ADV CRYPTOLOGY EUROC
  • [7] [Anonymous], 2013, PROC 7 ACM INT C DIS, DOI DOI 10.1145/2488222.2488266
  • [8] Bethencourt B. W. John, 2007, CIPHERTEXT POLICY AT, P321
  • [9] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [10] Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535