Attribute-Based Data Sharing Scheme Revisited in Cloud Computing

被引:121
作者
Wang, Shulan [1 ]
Liang, Kaitai [2 ]
Liu, Joseph K. [3 ]
Chen, Jianyong [4 ]
Yu, Jianping [1 ]
Xie, Weixin [1 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, ATR Key Lab Natl Def Technol, Shenzhen 518060, Peoples R China
[2] Aalto Univ, Dept Comp Sci, Espoo 02150, Finland
[3] Monash Univ, Fac Informat Technol, Melbourne, Vic 3800, Australia
[4] Shenzhen Univ, Coll Comp & Software Engn, Shenzhen 518060, Peoples R China
基金
芬兰科学院; 中国国家自然科学基金;
关键词
Secure data sharing; attribute-based encryption; removing escrow; weighted attribute; cloud computing; PROXY RE-ENCRYPTION; SECURE; EFFICIENT; STORAGE; SYSTEM;
D O I
10.1109/TIFS.2016.2549004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising encryption technique for secure data sharing in the context of cloud computing. Data owner is allowed to fully control the access policy associated with his data which to be shared. However, CP-ABE is limited to a potential security risk that is known as key escrow problem, whereby the secret keys of users have to be issued by a trusted key authority. Besides, most of the existing CP-ABE schemes cannot support attribute with arbitrary state. In this paper, we revisit attribute-based data sharing scheme in order to solve the key escrow issue but also improve the expressiveness of attribute, so that the resulting scheme is more friendly to cloud computing applications. We propose an improved two-party key issuing protocol that can guarantee that neither key authority nor cloud service provider can compromise the whole secret key of a user individually. Moreover, we introduce the concept of attribute with weight, being provided to enhance the expression of attribute, which can not only extend the expression from binary to arbitrary state, but also lighten the complexity of access policy. Therefore, both storage cost and encryption complexity for a ciphertext are relieved. The performance analysis and the security proof show that the proposed scheme is able to achieve efficient and secure data sharing in cloud computing.
引用
收藏
页码:1661 / 1673
页数:13
相关论文
共 40 条
  • [1] [Anonymous], P 12 INT C PRACT THE
  • [2] [Anonymous], 2013, IEEE T COMPUT, DOI DOI 10.1109/TC.2011.245
  • [3] [Anonymous], P 17 INT C INF COMM
  • [4] A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid
    Baek, Joonsang
    Quang Hieu Vu
    Liu, Joseph K.
    Huang, Xinyi
    Xiang, Yang
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2015, 3 (02) : 233 - 244
  • [5] An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
    Balu, A.
    Kuppusamy, K.
    [J]. INFORMATION SCIENCES, 2014, 276 : 354 - 362
  • [6] Belenkiy M, 2009, LECT NOTES COMPUT SC, V5677, P108, DOI 10.1007/978-3-642-03356-8_7
  • [7] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [8] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [9] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
  • [10] Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121