Secure attribute-based data sharing for resource-limited users in cloud computing

被引:356
作者
Li, Jin [1 ]
Zhang, Yinghui [2 ,3 ,4 ]
Chen, Xiaofeng [5 ]
Xiang, Yang [5 ,6 ]
机构
[1] Guangzhou Univ, Sch Comp Sci, Guangzhou, Guangdong, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[4] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
[5] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Shaanxi, Peoples R China
[6] Swinburne Univ Technol, Sch Software & Elect Engn, Hawthorn, Vic, Australia
基金
国家教育部博士点专项基金资助; 中国国家自然科学基金;
关键词
Cloud computing; Access control; Attribute-based encryption; Online/offline encryption; Chosen ciphertext security; ENCRYPTION; EFFICIENT; PROTECTION; REVOCATION;
D O I
10.1016/j.cose.2017.08.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data sharing becomes an exceptionally attractive service supplied by cloud computing platforms because of its convenience and economy. As a potential technique for realizing finegrained data sharing, attribute-based encryption (ABE) has drawn wide attentions. However, most of the existing ABE solutions suffer from the disadvantages of high computation overhead and weak data security, which has severely impeded resource-constrained mobile devices to customize the service. The problem of simultaneously achieving fine-grainedness, high efficiency on the data owner's side, and standard data confidentiality of cloud data sharing actually still remains unresolved. This paper addresses this challenging issue by proposing a new attribute-based data sharing, scheme suitable for resource-limited mobile users in cloud computing. The proposed scheme eliminates a majority of the computation task by adding system public parameters besides moving partial encryption computation offline. In addition, a public ciphertext test phase is performed before the decryption phase, which eliminates most of computation overhead due to illegitimate ciphertexts. For the sake of data security, a Chameleon hash function is used to generate an immediate ciphertext, which will be blinded by the offline ciphertexts to obtain the final online ciphertexts. The proposed scheme is proven secure against adaptively chosen-ciphertext attacks, which is widely recognized as a standard security notion. Extensive performance analysis indicates that the proposed scheme is secure and efficient. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 55 条
[1]  
[Anonymous], 14 INT C INF COMM SE
[2]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[3]  
[Anonymous], LNCS
[4]  
[Anonymous], 2005, INT J INF SECUR, DOI DOI 10.1007/S10207-005-0070-3
[5]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[6]  
Atallah M.J., 2010, Proc. ACM Symp. on Information, P48, DOI DOI 10.1145/1755688.1755695
[7]  
Atallah MJ, 2001, ADV COMPUT, V54, P215
[8]  
Ateniese G, 2005, LECT NOTES COMPUT SC, V3352, P165
[9]   Private and Cheating-Free Outsourcing of Algebraic Computations [J].
Benjamin, David ;
Atallah, Mikhail L. .
SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, :240-245
[10]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+